Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39196 PoC — Blackboard Learn 安全漏洞

Source
Associated Vulnerability
Title:Blackboard Learn 安全漏洞 (CVE-2022-39196)
Description:Blackboard Learn是美国Blackboard公司的一套学习管理系统。 Blackboard Learn 1.10.1版本存在安全漏洞,该漏洞源于其允许远程认证用户通过输入学生证书来读取非预期文件,然后直接访问特定的webapps/bbcms/execute/路径下的URL。
Description
Black board CMS Escalation of Privileges
Readme
## CVE-2022-39196
###  Black board CMS Escalation of Privileges

### Blackboard Learn version 1.10.1 allows remote authenticated users to read unintended files by entering student credentials and then directly visiting a certain webapps/bbcms/execute/ URL.

### Additional Information
	Step 1: Use a student credentials privilege. Username: ********** & Password: **********, to login. 
	Step 2: After successfully login by "STUDENT" account privilege.
	Step 3: Then request "URL / Location of vulnerability".
	Step 4: Directly without any privilege requirements you will escalated the session from "Student" to "Contest Management System" privileges.

### Vulnerability Type
	Sensitive Data Exposure

### Vendor of Product
	Blackboard Learn LMS


### Affected Product Code Base
	LMS - 1.10.1
	CMSMAIN - 1.10.1

 
### Attack Type
	Remote
 

### Impact Escalation of Privileges
	true


### Impact Information Disclosure
	true

### Attack Vectors
	Impact 1: View systems directories such as courses , institution, library and orgs directories & its contains.
 	Impact 2: Basic & Advance searching over courses , institution, library and orgs directories.
 	Impact 3: Searching & view about Blackboard LMS institution users.
 	Impact 4: Download files.

### Reference
	https://drive.google.com/drive/folders/1gonDDt0sCkpMdPDu_ZVwZ7EfLC8Z4JVn?usp=sharing

### Has vendor confirmed or acknowledged the vulnerability?
	true
### Discoverer
	Waseem Dayili
 
File Snapshot

[4.0K] /data/pocs/013d341b08cd360d77c1d1fa13e2ccca37225816 └── [1.4K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.