ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a ".." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.
References
Link | Resource |
---|---|
https://github.com/fuzzlove/ATutor-2.2.4-Language-Exploit | Exploit Third Party Advisory |
https://github.com/fuzzlove | Third Party Advisory |
http://incidentsecurity.com/atutor-2-2-4-language_import-arbitrary-file-upload-rce/ | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/153870/ATutor-2.2.4-Arbitrary-File-Upload-Command-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/158246/ATutor-2.2.4-Directory-Traversal-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2019-06-03 13:29
Updated : 2022-04-22 13:11
NVD link : CVE-2019-12169
Mitre link : CVE-2019-12169
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
atutor
- atutor