CVE-2024-38530 : GUNET OPENECLASS UP TO 3.15 H5P MODULE UNRESTRICTED UPLOAD

Description

The Open eClass platform (formerly known as GUnet eClass) is a complete Course Management System. An arbitrary file upload vulnerability in the “save” functionality of the H5P module enables unauthenticated users to upload arbitrary files on the server’s filesystem. This may lead in unrestricted RCE on the backend server, since the upload location is accessible from the internet. This vulnerability is fixed in 3.16.

References

https://github.com/gunet/openeclass/security/advisories/GHSA-88c3-hp7p-grgg

https://github.com/gunet/openeclass/commit/4449cf8bed40fd8fc4b267a5726fab9f9fe5a191

For More Information

CVERecord

Common Vulnerabilityies and Exposures

Contact us to get started

CVE-2024-57903 : LINUX KERNEL UP TO 5.15.175/6.1.123/6.6.69/6.12.8 IN_ATOMIC STACK-BASED OVERFLOW

CVE-2024-57903 : LINUX KERNEL UP TO 5.15.175/6.1.123/6.6.69/6.12.8 IN_ATOMIC STACK-BASED OVERFLOW

Description In the Linux kernel, the following vulnerability has been resolved: net: restrict SO_REUSEPORT to inet sockets After blamed commit,

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

CVE-2024-12867 : ARCTIC SECURITY ARCTIC HUB UP TO 5.5.1872 CONFIGURATION SERVER-SIDE REQUEST FORGERY

Description Server-Side Request Forgery in URL Mapper in Arctic Security’s Arctic Hub versions 3.0.1764-5.6.1877 allows an unauthenticated remote attacker to

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

CVE-2024-12840 : RED HAT SATELLITE HTTP PROXY SERVER-SIDE REQUEST FORGERY

Description A server-side request forgery exists in Satellite. When a PUT HTTP request is made to /http_proxies/test_connection, when supplied with