CVE-2020-24381

GUnet Open eClass Platform (aka openeclass) before 3.11 might allow remote attackers to read students' submitted assessments because it does not ensure that the web server blocks directory listings, and the data directory is inside the web root by default.
References
Link Resource
https://emaragkos.gr/cve-2020-24381/ Third Party Advisory
https://github.com/gunet/openeclass/issues/39 Exploit Issue Tracking Patch Third Party Advisory
https://emaragkos.gr/cve-2020-24381/ Third Party Advisory
https://github.com/gunet/openeclass/issues/39 Exploit Issue Tracking Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:14

Type Values Removed Values Added
References () https://emaragkos.gr/cve-2020-24381/ - Third Party Advisory () https://emaragkos.gr/cve-2020-24381/ - Third Party Advisory
References () https://github.com/gunet/openeclass/issues/39 - Exploit, Issue Tracking, Patch, Third Party Advisory () https://github.com/gunet/openeclass/issues/39 - Exploit, Issue Tracking, Patch, Third Party Advisory

Information

Published : 2020-08-19 12:15

Updated : 2024-11-21 05:14


NVD link : CVE-2020-24381

Mitre link : CVE-2020-24381

CVE.ORG link : CVE-2020-24381


JSON object : View

Products Affected

gunet

  • open_eclass_platform
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor