CVE-2015-1493
Vulnerability from cvelistv5
Published
2015-06-01 19:00
Modified
2024-08-06 04:47
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:47:16.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20150209 Moodle security issue made public", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2015/02/09/2" }, { "name": "[oss-security] 20150204 CVE request for Moodlee MDL-48980 Security: Always clean the result from min_get_slash_argument", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://openwall.com/lists/oss-security/2015/02/04/15" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=af9a7937cc085f96bdbc4724cadec6eeae0242fc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-48980" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=279956" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-02-04T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-06-01T19:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20150209 Moodle security issue made public", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2015/02/09/2" }, { "name": "[oss-security] 20150204 CVE request for Moodlee MDL-48980 Security: Always clean the result from min_get_slash_argument", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://openwall.com/lists/oss-security/2015/02/04/15" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=af9a7937cc085f96bdbc4724cadec6eeae0242fc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-48980" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://moodle.org/mod/forum/discuss.php?d=279956" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-1493", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20150209 Moodle security issue made public", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2015/02/09/2" }, { "name": "[oss-security] 20150204 CVE request for Moodlee MDL-48980 Security: Always clean the result from min_get_slash_argument", "refsource": "MLIST", "url": "http://openwall.com/lists/oss-security/2015/02/04/15" }, { "name": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=af9a7937cc085f96bdbc4724cadec6eeae0242fc", "refsource": "CONFIRM", "url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=af9a7937cc085f96bdbc4724cadec6eeae0242fc" }, { "name": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-48980", "refsource": "CONFIRM", "url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-48980" }, { "name": "https://moodle.org/mod/forum/discuss.php?d=279956", "refsource": "CONFIRM", "url": "https://moodle.org/mod/forum/discuss.php?d=279956" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-1493", "datePublished": "2015-06-01T19:00:00", "dateReserved": "2015-02-05T00:00:00", "dateUpdated": "2024-08-06T04:47:16.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-1493\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2015-06-01T19:59:08.603\",\"lastModified\":\"2023-11-07T02:24:50.163\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Directory traversal vulnerability in the min_get_slash_argument function in lib/configonlylib.php in Moodle through 2.5.9, 2.6.x before 2.6.8, 2.7.x before 2.7.5, and 2.8.x before 2.8.3 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the file parameter, as demonstrated by reading PHP scripts.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de salto de directorio en la funci\u00f3n min_get_slash_argument en lib/configonlylib.php en Moodle hasta 2.5.9, 2.6.x anterior a 2.6.8, 2.7.x anterior a 2.7.5, y 2.8.x anterior a 2.8.3 permite a usuarios remotos autenticados leer ficheros arbitrarios a trav\u00e9s de un .. (punto punto) en el par\u00e1metro file, tal y como fue demostrado mediante la lectura de secuencias de comandos PHP.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.8},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.5.9\",\"matchCriteriaId\":\"83F79402-5EA5-42D8-8292-8C71C8BA748F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD1B5B42-ECA9-4888-B18E-AD8D282311DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EF03304-032C-4E85-A802-7CDAC89216FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"311BEFF3-A58A-4CA8-BE09-F8D081EA13A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D2A1F8-82FF-4C1A-A872-71D93874EEAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E79BB0-6017-441C-9B10-00E55FDF0986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA845882-C0F4-4522-94B2-9AA21A08887A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F341A8-0AC8-4033-8C99-0249B7289F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CE1A520-762B-4A35-8075-ED4ECA0A1CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9803CBE2-80A6-47EB-A782-CC8F1E66FBD9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05112EC5-3AAA-499B-8763-345187529C09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71407960-077B-4407-B249-789436687D91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72728F94-D408-4CAD-A214-800B1D1C7971\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C1E9B5-6B2B-4230-92F2-EC0FB307ECF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6925A366-37EB-41ED-85C8-B56D6A93D4EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6400F9D-9654-444F-9EBB-0F73025AD744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66ED87A3-8237-4182-BEF5-052346067737\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57441C51-2ADB-48B9-A655-82D6B1071C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E8D7276-415B-4394-8CBE-53EB40B8C5BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E051AAC-EB40-491F-AF0E-EE8143C12567\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FADBE87F-1855-453B-B958-0CB8A7908A06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B53A7D2-BDA2-4185-97C3-977A04876A37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A51DFFA8-DFF0-429C-B697-F82F41621FEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19FD1565-0DA1-4BA8-A501-86F13D3D29ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12737AF4-B2D5-4661-B06A-6A06FE95EC2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88C59A94-D225-478A-B23E-41C4324BC643\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"192EA69B-A1E1-4E0D-8E73-76EB74CCDE49\"}]}]}],\"references\":[{\"url\":\"http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=af9a7937cc085f96bdbc4724cadec6eeae0242fc\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-48980\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2015/02/04/15\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://openwall.com/lists/oss-security/2015/02/09/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://moodle.org/mod/forum/discuss.php?d=279956\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.