CVE-2022-41956

Autolab is a course management service, initially developed by a team of students at Carnegie Mellon University, that enables instructors to offer autograded programming assignments to their students over the Web. A file disclosure vulnerability was discovered in Autolab's remote handin feature, whereby users are able to hand-in assignments using paths outside their submission directory. Users can then view the submission to view the file's contents. The vulnerability has been patched in version 2.10.0. As a workaround, ensure that the field for the remote handin feature is empty (Edit Assessment > Advanced > Remote handin path), and that you are not running Autolab as `root` (or any user that has write access to `/`). Alternatively, disable the remote handin feature if it is unneeded by replacing the body of `local_submit` in `app/controllers/assessment/handin.rb` with `render(plain: "Feature disabled", status: :bad_request) && return`.
Configurations

Configuration 1 (hide)

cpe:2.3:a:autolabproject:autolab:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:24

Type Values Removed Values Added
References () https://github.com/autolab/Autolab/security/advisories/GHSA-g7x7-mgrv-f24x - Third Party Advisory () https://github.com/autolab/Autolab/security/advisories/GHSA-g7x7-mgrv-f24x - Third Party Advisory
References () https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ - () https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ -
References () https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/ - Third Party Advisory () https://www.stackhawk.com/blog/rails-path-traversal-guide-examples-and-prevention/ - Third Party Advisory
Summary
  • (es) Autolab es un servicio de gestión de cursos, desarrollado inicialmente por un equipo de estudiantes de la Universidad Carnegie Mellon, que permite a los instructores ofrecer tareas de programación autocalificadas a sus estudiantes a través de la Web. Se descubrió una vulnerabilidad de divulgación de archivos en la función de entrega remota de Autolab, mediante la cual los usuarios pueden entregar tareas utilizando rutas fuera de su directorio de envío. Luego, los usuarios pueden ver el envío para ver el contenido del archivo. Esta vulnerabilidad ha sido parcheada en la versión 2.10.0. Como workaround, asegúrese de que el campo para la función de entrega remota esté vacío (Edit Assessment > Advanced > Remote handin path) y que no esté ejecutando Autolab como `root` (o cualquier usuario que tenga acceso de escritura a `/ `). Alternativamente `local_submit` in `app/controllers/assessment/handin.rb` with `render(plain: "Feature disabled", status: :bad_request) && return`.

11 Dec 2023, 19:15

Type Values Removed Values Added
References
  • () https://securitylab.github.com/advisories/GHSL-2022-100_Autolab/ -

Information

Published : 2023-01-14 01:15

Updated : 2024-11-21 07:24


NVD link : CVE-2022-41956

Mitre link : CVE-2022-41956

CVE.ORG link : CVE-2022-41956


JSON object : View

Products Affected

autolabproject

  • autolab
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')