Skip to content

Moodle directory traversal vulnerability

Moderate severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Jan 25, 2024

Package

composer moodle/moodle (Composer)

Affected versions

< 2.6.8
>= 2.7.0, < 2.7.5
>= 2.8.0, < 2.8.3

Patched versions

2.6.8
2.7.5
2.8.3

Description

Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts.

References

Published by the National Vulnerability Database Jun 1, 2015
Published to the GitHub Advisory Database May 13, 2022
Reviewed Jan 25, 2024
Last updated Jan 25, 2024

Severity

Moderate

EPSS score

0.177%
(56th percentile)

Weaknesses

CVE ID

CVE-2015-1493

GHSA ID

GHSA-gphj-63h8-r9vq

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.