GUnet Open eClass Platform (aka openeclass) before 3.11 might allow remote attackers to read students' submitted assessments because it does not ensure that the web server blocks directory listings, and the data directory is inside the web root by default.
References
Link | Resource |
---|---|
https://emaragkos.gr/cve-2020-24381/ | Third Party Advisory |
https://github.com/gunet/openeclass/issues/39 | Exploit Issue Tracking Patch Third Party Advisory |
https://emaragkos.gr/cve-2020-24381/ | Third Party Advisory |
https://github.com/gunet/openeclass/issues/39 | Exploit Issue Tracking Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://emaragkos.gr/cve-2020-24381/ - Third Party Advisory | |
References | () https://github.com/gunet/openeclass/issues/39 - Exploit, Issue Tracking, Patch, Third Party Advisory |
Information
Published : 2020-08-19 12:15
Updated : 2024-11-21 05:14
NVD link : CVE-2020-24381
Mitre link : CVE-2020-24381
CVE.ORG link : CVE-2020-24381
JSON object : View
Products Affected
gunet
- open_eclass_platform
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor