cve/2023/CVE-2023-44395.md

18 lines
990 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-44395](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44395)
![](https://img.shields.io/static/v1?label=Product&message=Autolab&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.12.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds