CVE-2015-1493: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
(updated )
Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-48980
- git.moodle.org/gw?p=moodle.git;a=commit;h=af9a7937cc085f96bdbc4724cadec6eeae0242fc
- openwall.com/lists/oss-security/2015/02/04/15
- openwall.com/lists/oss-security/2015/02/09/2
- github.com/advisories/GHSA-gphj-63h8-r9vq
- github.com/moodle/moodle/commit/0289be1321babfa588fb5b18ebb08a296eed9eee
- github.com/moodle/moodle/commit/a72f2cca7f08c354c18a3923c3f05eee50bdd434
- github.com/moodle/moodle/commit/af9a7937cc085f96bdbc4724cadec6eeae0242fc
- github.com/moodle/moodle/commit/cc496f5b27d36a8df4bcede997a484eb9719363b
- moodle.org/mod/forum/discuss.php?d=279956
- nvd.nist.gov/vuln/detail/CVE-2015-1493
Detect and mitigate CVE-2015-1493 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →