{ "id": "CVE-2023-44395", "sourceIdentifier": "security-advisories@github.com", "published": "2024-01-22T15:15:08.037", "lastModified": "2024-11-21T08:25:48.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue." }, { "lang": "es", "value": "Autolab es un servicio de gesti\u00f3n de cursos que permite a los profesores ofrecer tareas de programaci\u00f3n con calificaci\u00f3n autom\u00e1tica a sus estudiantes a trav\u00e9s de la Web. Se descubrieron vulnerabilidades de path traversal en la funcionalidad de evaluaci\u00f3n de Autolab en versiones de Autolab anteriores a la 2.12.0, mediante las cuales los instructores pueden realizar lecturas de archivos arbitrarias. La versi\u00f3n 2.12.0 contiene un parche. No existen workarounds viables para este problema." } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "baseScore": 4.9, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 1.2, "impactScore": 3.6 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "baseScore": 6.5, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-22" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:autolabproject:autolab:*:*:*:*:*:*:*:*", "versionEndExcluding": "2.12.0", "matchCriteriaId": "E1C7D024-2BC5-4EB3-8FF6-006C25BBAFFD" } ] } ] } ], "references": [ { "url": "https://github.com/autolab/Autolab/releases/tag/v2.12.0", "source": "security-advisories@github.com", "tags": [ "Release Notes" ] }, { "url": "https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx", "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/", "source": "security-advisories@github.com", "tags": [ "Technical Description" ] }, { "url": "https://github.com/autolab/Autolab/releases/tag/v2.12.0", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes" ] }, { "url": "https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ] } ] }