Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mf8r-552p-3grv

Опубликовано: 26 июн. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 8.7
CVSS3: 7.5

Описание

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

EPSS

Процентиль: 86%
0.03185
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-20
CWE-22

Связанные уязвимости

CVSS3: 7.5
nvd
23 дня назад

A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.

EPSS

Процентиль: 86%
0.03185
Низкий

8.7 High

CVSS4

7.5 High

CVSS3

Дефекты

CWE-20
CWE-22