CVE-2023-45878

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-45878
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-45878.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-45878
Published
2023-11-14T06:15:29Z
Modified
2025-02-19T03:34:06.156340Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubricsvisualisesaveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).

References

Affected packages

Git / github.com/gibbonedu/core

Affected ranges

Type
GIT
Repo
https://github.com/gibbonedu/core
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

Other

PR_Attendance
PR_Markbook_Sidebar
PR_Timetable_Tools
test-tag-3
test-tag-3b
test-tag-4
test-tag-5

test-build-v23.*

test-build-v23.0.01

v10.*

v10.0.00

v11.*

v11.0.00

v12.*

v12.0.00

v13.*

v13.0.00
v13.0.01
v13.0.02

v14.*

v14.0.00
v14.0.01

v15.*

v15.0.00
v15.0.01

v16.*

v16.0.00
v16.0.01

v17.*

v17.0.00

v18.*

v18.0.00
v18.0.01

v19.*

v19.0.00

v20.*

v20.0.00

v21.*

v21.0.00
v21.0.01

v22.*

v22.0.00
v22.0.00-pre

v23.*

v23.0.00
v23.0.00-testbuild2
v23.0.01
v23.0.02

v24.*

v24.0.00

v25.*

v25.0.01

v7.*

v7.0.00
v7.0.01
v7.1.00
v7.1.01
v7.1.02

v8.*

v8.0.00
v8.0.01
v8.0.02
v8.0.03
v8.0.04
v8.0.05
v8.0.06
v8.1.00
v8.2.00
v8.3.00

v9.*

v9.0.00
v9.1.00