cvelist/2023/44xxx/CVE-2023-44395.json
2024-01-22 15:00:33 +00:00

96 lines
3.5 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-44395",
"ASSIGNER": "security-advisories@github.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "autolab",
"product": {
"product_data": [
{
"product_name": "Autolab",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "< 2.12.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx",
"refsource": "MISC",
"name": "https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx"
},
{
"url": "https://github.com/autolab/Autolab/releases/tag/v2.12.0",
"refsource": "MISC",
"name": "https://github.com/autolab/Autolab/releases/tag/v2.12.0"
},
{
"url": "https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/",
"refsource": "MISC",
"name": "https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/"
}
]
},
"source": {
"advisory": "GHSA-h8wq-ghfq-5hfx",
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
}
}