SB2015060103 - Path traversal in Moodle
Published: June 1, 2015 Updated: January 16, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2015-1493)
The vulnerability allows a remote user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3. A remote authenticated user can send a specially crafted HTTP request and remote authenticated users to read arbitrary files via a . (dot dot) in the file parameter, as demonstrated by reading PHP scripts.
Remediation
Install update from vendor's website.
References
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-48980
- http://git.moodle.org/gw?p=moodle.git;a=commit;h=af9a7937cc085f96bdbc4724cadec6eeae0242fc
- http://openwall.com/lists/oss-security/2015/02/04/15
- http://openwall.com/lists/oss-security/2015/02/09/2
- https://moodle.org/mod/forum/discuss.php?d=279956