MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading.
References
Link | Resource |
---|---|
https://github.com/MarkUsProject/Markus/pull/7026 | Patch |
https://github.com/MarkUsProject/Markus/security/advisories/GHSA-wq6v-vx8c-8fj8 | Third Party Advisory |
Configurations
History
04 Sep 2025, 17:25
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:* | |
References | () https://github.com/MarkUsProject/Markus/pull/7026 - Patch | |
References | () https://github.com/MarkUsProject/Markus/security/advisories/GHSA-wq6v-vx8c-8fj8 - Third Party Advisory | |
First Time |
Markusproject
Markusproject markus |
19 Nov 2024, 21:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Nov 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-18 17:15
Updated : 2025-09-04 17:25
NVD link : CVE-2024-47820
Mitre link : CVE-2024-47820
CVE.ORG link : CVE-2024-47820
JSON object : View
Products Affected
markusproject
- markus
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')