
Cloud Vulnerability DB
A community-led vulnerabilities database
GibbonEdu Gibbon version 25.0.1 and before contains an Arbitrary File Write vulnerability in the rubricsvisualisesaveAjax.phps component. The vulnerability exists because the endpoint does not require authentication and accepts parameters that allow writing arbitrary files to the system (USD Advisory, NVD).
The vulnerability exists in the rubricsvisualisesaveAjax.php file which accepts img, path and gibbonPersonID as POST parameters without authentication. The img parameter is expected to be a base64 encoded image that gets decoded and written to a file path specified by the path parameter, concatenated with the installation's absolute path. This allows attackers to write arbitrary PHP files by crafting malicious base64 encoded content (USD Advisory). The vulnerability has been assigned a CVSS v3.1 base score of 9.8 CRITICAL (NVD).
This vulnerability allows unauthenticated attackers to upload arbitrary files to the application and achieve remote code execution on the underlying system by crafting fake images that can be stored as PHP files (USD Advisory).
The vulnerability has been fixed in commit '226d83568cf3d447c4d86d4e5aba2c6e6289045d'. Users should upgrade to a version after this commit. The recommended fix is to ensure that only valid file types can be uploaded (USD Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."