SB2015060103 - Path traversal in Moodle 



SB2015060103 - Path traversal in Moodle

Published: June 1, 2015 Updated: January 16, 2023

Security Bulletin ID SB2015060103
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Information disclosure

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Path traversal (CVE-ID: CVE-2015-1493)

The vulnerability allows a remote user to perform directory traversal attacks.

The vulnerability exists due to input validation error when processing directory traversal sequences in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3. A remote authenticated user can send a specially crafted HTTP request and remote authenticated users to read arbitrary files via a . (dot dot) in the file parameter, as demonstrated by reading PHP scripts.


Remediation

Install update from vendor's website.