Логотип exploitDog
bind:CVE-2023-45868
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-45868

Количество 4

Количество 4

nvd логотип

CVE-2023-45868

больше 2 лет назад

The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable.

CVSS3: 8.1
EPSS: Низкий
debian логотип

CVE-2023-45868

больше 2 лет назад

The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attac ...

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-q6jg-9395-p66m

больше 2 лет назад

The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable.

CVSS3: 6.5
EPSS: Низкий
fstec логотип

BDU:2023-07496

больше 2 лет назад

Уязвимость компонента Learning Module системы управления обучением и поддержки учебного процесса ILIAS, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-45868

The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable.

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-45868

The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attac ...

CVSS3: 8.1
0%
Низкий
больше 2 лет назад
github логотип
GHSA-q6jg-9395-p66m

The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable.

CVSS3: 6.5
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-07496

Уязвимость компонента Learning Module системы управления обучением и поддержки учебного процесса ILIAS, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 8.1
0%
Низкий
больше 2 лет назад

Уязвимостей на страницу