Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-1493

Опубликовано: 01 июн. 2015
Источник: ubuntu
Приоритет: medium
CVSS2: 6.8

Описание

Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts.

РелизСтатусПримечание
artful

not-affected

2.7.5+dfsg-1
bionic

not-affected

3.0.3+dfsg-0ubuntu1
cosmic

not-affected

3.0.3+dfsg-0ubuntu1
devel

not-affected

3.0.3+dfsg-0ubuntu1
disco

not-affected

3.0.3+dfsg-0ubuntu1
esm-apps/bionic

not-affected

3.0.3+dfsg-0ubuntu1
esm-apps/xenial

not-affected

3.0.3+dfsg-0ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
lucid

ignored

end of life
precise

ignored

end of life

Показывать по

6.8 Medium

CVSS2

Связанные уязвимости

nvd
около 10 лет назад

Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts.

debian
около 10 лет назад

Directory traversal vulnerability in the min_get_slash_argument functi ...

github
около 3 лет назад

Moodle directory traversal vulnerability

fstec
около 10 лет назад

Уязвимость системы управления обучением Мoodle, позволяющая нарушителю читать произвольные файлы

6.8 Medium

CVSS2