ILIAS (2013-09-12 release) contains a medium-criticality Directory Traversal local file inclusion vulnerability in the ScormAicc module. An attacker with a privileged account, typically holding the tutor role, can exploit this to gain unauthorized access to and potentially retrieve confidential files stored on the web server. The attacker can access files that are readable by the web server user www-data; this may include sensitive configuration files and documents located outside the documentRoot. The vulnerability is exploited by an attacker who manipulates the file parameter in a URL, inserting directory traversal sequences in order to access unauthorized files. This manipulation allows the attacker to retrieve sensitive files, such as /etc/passwd, potentially compromising the system's security. This issue poses a significant risk to confidentiality and is remotely exploitable over the internet.
References
Link | Resource |
---|---|
https://rehmeinfosec.de | Third Party Advisory |
https://rehmeinfosec.de/labor/cve-2023-45867 | Exploit Third Party Advisory |
Configurations
History
12 Sep 2024, 15:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-26 15:15
Updated : 2024-09-12 15:35
NVD link : CVE-2023-45867
Mitre link : CVE-2023-45867
CVE.ORG link : CVE-2023-45867
JSON object : View
Products Affected
ilias
- ilias
CWE