Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Path Traversal in Archive Handling Leading to Code Execution
Vulnerability Description
OpenOLAT is a web-based learning management system (LMS). A path traversal vulnerability exists in versions prior to 15.3.18, 15.5.3, and 16.0.0. Using a specially prepared ZIP file, it is possible to overwrite any file that is writable by the application server user (e.g. the tomcat user). Depending on the configuration this can be limited to files of the OpenOlat user data directory, however, if not properly set up, the attack could also be used to overwrite application server config files, java code or even operating system files. The attack could be used to corrupt or modify any OpenOlat file such as course structures, config files or temporary test data. Those attack would require in-depth knowledge of the installation and thus more theoretical. If the app server configuration allows the execution of jsp files and the path to the context is known, it is also possible to execute java code. If the app server runs with the same user that is used to deploy the OpenOlat code or has write permissions on the OpenOlat code files and the path to the context is know, code injection is possible. The attack requires an OpenOlat user account to upload a ZIP file and trigger the unzip method. It can not be exploited by unregistered users. The problem is fixed in versions 15.3.18, 15.5.3 and 16.0.0. There are no known workarounds aside from upgrading.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
OpenOLAT 路径遍历漏洞
Vulnerability Description
OpenOLAT是一个基于网络的电子学习平台,用于教学、学习、评估和交流,一个 LMS,一个学习管理系统。 OpenOLAT 存在路径遍历漏洞,该漏洞源于软件对于上传zip文件没有进行有效的过滤和验证。攻击者使用特别准备的ZIP文件,可以覆盖应用服务器用户(例如tomcat用户)可写入的任何文件。根据配置的不同,这种攻击可能仅限于OpenOlat用户数据目录的文件,但是,如果没有正确设置,这种攻击还可能用于覆盖应用服务器配置文件、java代码甚至操作系统文件。这种攻击可以用来破坏或修改任何OpenOlat
CVSS Information
N/A
Vulnerability Type
N/A