cve/2023/CVE-2023-32317.md

19 lines
1.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-32317](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32317)
![](https://img.shields.io/static/v1?label=Product&message=Autolab&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.11.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
Autolab is a course management service that enables auto-graded programming assignments. A Tar slip vulnerability was found in the MOSS cheat checker functionality of Autolab. To exploit this vulnerability an authenticated attacker with instructor permissions needs to upload a specially crafted Tar file. Both "Base File Tar" and "Additional file archive" can be fed with Tar files that contain paths outside their target directories (e.g., `../../../../tmp/tarslipped2.sh`). When the MOSS cheat checker is started the files inside of the archives are expanded to the attacker-chosen locations. This issue may lead to arbitrary file write within the scope of the running process. This issue has been addressed in version 2.11.0. Users are advised to upgrade.
### POC
#### Reference
- https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
2024-06-09 00:33:16 +00:00
- https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.