8 results (0.024 seconds)

CVSS: 6.8EPSS: 0%CPEs: 1EXPL: 0

Autolab is a course management service that enables auto-graded programming assignments. A user can modify their first and or last name to include a valid excel / spreadsheet formula. When an instructor downloads their course's roster and opens, this name will then be evaluated as a formula. This could lead to leakage of information of students in the course roster by sending the data to a remote endpoint. This issue has been patched in the source code repository and the fix is expected to be released in the next version. • https://github.com/autolab/Autolab/commit/fe44b53815d37c63e751032205b692ccd5737620 https://github.com/autolab/Autolab/security/advisories/GHSA-cqxx-pfmh-h43g • CWE-1236: Improper Neutralization of Formula Elements in a CSV File •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

Autolab is a course management service that enables auto-graded programming assignments. From Autolab versions v.3.0.0 onward students can download all assignments from another student, as long as they are logged in, using the download_all_submissions feature. This can allow for leakage of submissions to unauthorized users, such as downloading submissions from other students in the class, or even instructor test submissions, given they know their user IDs. This issue has been patched in commit `1aa4c769` which is not yet in a release version, but is expected to be included in version 3.0.3. Users are advised to either manually patch or to wait for version 3.0.3. • https://github.com/autolab/Autolab/commit/1aa4c7690892fb458d2c61ff86739f368e34769d https://github.com/autolab/Autolab/security/advisories/GHSA-84qc-7773-2gg3 • CWE-359: Exposure of Private Personal Information to an Unauthorized Actor CWE-862: Missing Authorization •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Autolab is a course management service that enables instructors to offer autograded programming assignments to their students over the Web. Path traversal vulnerabilities were discovered in Autolab's assessment functionality in versions of Autolab prior to 2.12.0, whereby instructors can perform arbitrary file reads. Version 2.12.0 contains a patch. There are no feasible workarounds for this issue. Autolab es un servicio de gestión de cursos que permite a los profesores ofrecer tareas de programación con calificación automática a sus estudiantes a través de la Web. • https://github.com/autolab/Autolab/releases/tag/v2.12.0 https://github.com/autolab/Autolab/security/advisories/GHSA-h8wq-ghfq-5hfx https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Autolab is a course management service that enables auto-graded programming assignments. A Tar slip vulnerability was found in the Install assessment functionality of Autolab. To exploit this vulnerability an authenticated attacker with instructor permissions needs to upload a specially crafted Tar file. Using the install assessment functionality an attacker can feed a Tar file that contain files with paths pointing outside of the target directory (e.g., `../../../../tmp/tarslipped1.sh`). • https://github.com/autolab/Autolab/commit/14f508484a8323eceb0cf3a128573b43eabbc80d https://github.com/autolab/Autolab/security/advisories/GHSA-x9hj-r9q4-832c https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Autolab is a course management service that enables auto-graded programming assignments. A Tar slip vulnerability was found in the MOSS cheat checker functionality of Autolab. To exploit this vulnerability an authenticated attacker with instructor permissions needs to upload a specially crafted Tar file. Both "Base File Tar" and "Additional file archive" can be fed with Tar files that contain paths outside their target directories (e.g., `../../../../tmp/tarslipped2.sh`). • https://github.com/autolab/Autolab/commit/410a9228ee265f80692334d75eb2c3b4dac6f9e5 https://github.com/autolab/Autolab/security/advisories/GHSA-h8g5-vhm4-wx6g https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •