Path Traversal Affecting moodle/moodle package, versions <2.6.8>=2.7.0-beta, <2.7.5>=2.8.0-beta, <2.8.3


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.18% (57th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Path Traversal vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MOODLEMOODLE-6209158
  • published28 Jan 2024
  • disclosed13 May 2022
  • creditEmiel Florijn

Introduced: 13 May 2022

CVE-2015-1493  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade moodle/moodle to version 2.6.8, 2.7.5, 2.8.3 or higher.

Overview

moodle/moodle is a learning platform.

Affected versions of this package are vulnerable to Path Traversal via the min_get_slash_argument function in lib/configonlylib.php. An attacker can read arbitrary files by supplying a specially crafted file parameter that includes directory traversal sequences such as .., leading to the disclosure of sensitive information or server configuration details.

CVSS Scores

version 3.1