2024-02-22 21:00:33 +00:00

87 lines
3.9 KiB
JSON

{
"id": "CVE-2023-45868",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-26T15:15:08.957",
"lastModified": "2024-02-22T19:06:44.663",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Learning Module in ILIAS 7.25 (2023-09-12 release) allows an attacker (with basic user privileges) to achieve a high-impact Directory Traversal attack on confidentiality and availability. By exploiting this network-based vulnerability, the attacker can move specified directories, normally outside the documentRoot, to a publicly accessible location via the PHP function rename(). This results in a total loss of confidentiality, exposing sensitive resources, and potentially denying access to the affected component and the operating system's components. To exploit this, an attacker must manipulate a POST request during the creation of an exercise unit, by modifying the old_name and new_name parameters via directory traversal. However, it's essential to note that, when exploiting this vulnerability, the specified directory will be relocated from its original location, rendering all files obtained from there unavailable."
},
{
"lang": "es",
"value": "El M\u00f3dulo de Learning en ILIAS 7.25 (versi\u00f3n del 12/09/2013) permite a un atacante (con privilegios de usuario b\u00e1sicos) lograr un ataque de Directory Traversal de alto impacto sobre la confidencialidad y la disponibilidad. Al explotar esta vulnerabilidad basada en la red, el atacante puede mover directorios espec\u00edficos, normalmente fuera de documentRoot, a una ubicaci\u00f3n de acceso p\u00fablico mediante la funci\u00f3n PHP rename(). Esto da como resultado una p\u00e9rdida total de confidencialidad, exponiendo recursos confidenciales y potencialmente denegando el acceso al componente afectado y a los componentes del sistema operativo. Para aprovechar esto, un atacante debe manipular una solicitud POST durante la creaci\u00f3n de una unidad de ejercicio, modificando los par\u00e1metros old_name y new_name a trav\u00e9s del recorrido del directorio. Sin embargo, es esencial tener en cuenta que, al explotar esta vulnerabilidad, el directorio especificado se reubicar\u00e1 desde su ubicaci\u00f3n original, lo que har\u00e1 que todos los archivos obtenidos desde all\u00ed no est\u00e9n disponibles."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilias:ilias:7.25:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8E6CB0-A19A-4B18-90D8-352676E169E9"
}
]
}
]
}
],
"references": [
{
"url": "https://rehmeinfosec.de",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://rehmeinfosec.de/labor/cve-2023-45867",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}