MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading.
History

Mon, 18 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 Nov 2024 17:00:00 +0000

Type Values Removed Values Added
Description MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading.
Title MarkUs vulnerable to Path Traversal
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2024-11-18T19:05:12.639Z

Reserved: 2024-10-03T14:06:12.638Z

Link: CVE-2024-47820

cve-icon Vulnrichment

Updated: 2024-11-18T19:04:59.688Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-18T17:15:11.777

Modified: 2024-11-19T21:57:56.293

Link: CVE-2024-47820

cve-icon Redhat

No data.