CVE-2014-7848: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
lib/phpunit/bootstrap.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 allows remote attackers to obtain sensitive information via a direct request, which reveals the full path in an error message.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47287
- openwall.com/lists/oss-security/2014/11/17/11
- github.com/advisories/GHSA-47cw-whh9-j2fq
- github.com/moodle/moodle/commit/0baf9763636aa4158a45ef2b539d2df0aa0bbd53
- github.com/moodle/moodle/commit/1993cc02b6b05f45ff1776813567c6b3f91480f4
- github.com/moodle/moodle/commit/84baa6b1417328ef7e4085d0112acc57167d15e4
- moodle.org/mod/forum/discuss.php?d=275160
- nvd.nist.gov/vuln/detail/CVE-2014-7848
- web.archive.org/web/20150914064838/http://www.securitytracker.com/id/1031215
Detect and mitigate CVE-2014-7848 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →