CVE-2022-33116

An issue in the jmpath variable in /modules/mindmap/index.php of GUnet Open eClass Platform (aka openeclass) v3.12.4 and below allows attackers to read arbitrary files via a directory traversal.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openeclass:openeclass:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:07

Type Values Removed Values Added
References () https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/ - Exploit, Third Party Advisory () https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/ - Exploit, Third Party Advisory
References () https://github.com/gunet/openeclass - Product, Third Party Advisory () https://github.com/gunet/openeclass - Product, Third Party Advisory
References () https://hg.gunet.gr/openeclass/diff/cbfc90094d51/modules/mindmap/index.php - Patch, Vendor Advisory () https://hg.gunet.gr/openeclass/diff/cbfc90094d51/modules/mindmap/index.php - Patch, Vendor Advisory
References () https://www.openeclass.org/en/ - Product, Vendor Advisory () https://www.openeclass.org/en/ - Product, Vendor Advisory

Information

Published : 2022-06-27 21:15

Updated : 2024-11-21 07:07


NVD link : CVE-2022-33116

Mitre link : CVE-2022-33116

CVE.ORG link : CVE-2022-33116


JSON object : View

Products Affected

openeclass

  • openeclass
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')