MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading.
Metrics
Affected Vendors & Products
References
History
Mon, 18 Nov 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 18 Nov 2024 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading. | |
Title | MarkUs vulnerable to Path Traversal | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-18T19:05:12.639Z
Reserved: 2024-10-03T14:06:12.638Z
Link: CVE-2024-47820

Updated: 2024-11-18T19:04:59.688Z

Status : Awaiting Analysis
Published: 2024-11-18T17:15:11.777
Modified: 2024-11-19T21:57:56.293
Link: CVE-2024-47820

No data.