Autolab is a course management service that enables auto-graded programming assignments. A Tar slip vulnerability was found in the Install assessment functionality of Autolab. To exploit this vulnerability an authenticated attacker with instructor permissions needs to upload a specially crafted Tar file. Using the install assessment functionality an attacker can feed a Tar file that contain files with paths pointing outside of the target directory (e.g., `../../../../tmp/tarslipped1.sh`). When the Install assessment form is submitted the files inside of the archives are expanded to the attacker-chosen locations. This issue has been addressed in version 2.11.0. Users are advised to upgrade.
References
Configurations
History
11 Dec 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jun 2023, 15:30
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CWE | CWE-22 | |
CPE | cpe:2.3:a:autolabproject:autolab:*:*:*:*:*:*:*:* | |
References | (MISC) https://github.com/autolab/Autolab/commit/14f508484a8323eceb0cf3a128573b43eabbc80d - Patch | |
References | (MISC) https://github.com/autolab/Autolab/security/advisories/GHSA-x9hj-r9q4-832c - Vendor Advisory |
26 May 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-26 23:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-32676
Mitre link : CVE-2023-32676
CVE.ORG link : CVE-2023-32676
JSON object : View
Products Affected
autolabproject
- autolab
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')