GUnet Open eClass Platform (aka openeclass) before 3.11 might allow remote attackers to read students' submitted assessments because it does not ensure that the web server blocks directory listings, and the data directory is inside the web root by default.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://emaragkos.gr/cve-2020-24381/ | third party advisory |
https://github.com/gunet/openeclass/issues/39 | patch exploit third party advisory issue tracking |