An issue in the jmpath variable in /modules/mindmap/index.php of GUnet Open eClass Platform (aka openeclass) v3.12.4 and below allows attackers to read arbitrary files via a directory traversal.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.openeclass.org/en/ | product vendor advisory |
https://github.com/gunet/openeclass | third party advisory product |
https://hg.gunet.gr/openeclass/diff/cbfc90094d51/modules/mindmap/index.php | patch vendor advisory |
https://emaragkos.gr/gunet-open-eclass-authenticated-path-traversal/ | third party advisory exploit |