GibbonEdu Gibbon through version 25.0.0 allows Directory Traversal via the report template builder. An attacker can create a new Asset Component. The templateFileDestination parameter can be set to an arbitrary pathname (and extension). This allows creation of PHP files outside of the uploads directory, directly in the webroot.
References
Link | Resource |
---|---|
https://herolab.usd.de/security-advisories/usd-2023-0022/ | Exploit Third Party Advisory |
https://herolab.usd.de/security-advisories/usd-2023-0022/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://herolab.usd.de/security-advisories/usd-2023-0022/ - Exploit, Third Party Advisory |
17 Nov 2023, 18:13
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:* | |
First Time |
Gibbonedu gibbon
Gibbonedu |
|
CWE | CWE-22 | |
References | () https://herolab.usd.de/security-advisories/usd-2023-0022/ - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
14 Nov 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 06:15
Updated : 2024-11-21 08:27
NVD link : CVE-2023-45880
Mitre link : CVE-2023-45880
CVE.ORG link : CVE-2023-45880
JSON object : View
Products Affected
gibbonedu
- gibbon
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')