Vulnerability CVE-2020-13144


Published: 2020-05-18

Description:
Studio in Open edX Ironwood 2.5, when CodeJail is not used, allows a user to go to the "Create New course>New section>New subsection>New unit>Add new component>Problem button>Advanced tab>Custom Python evaluated code" screen, edit the problem, and execute Python code. This leads to arbitrary code execution.

See advisories in our WLB2 database:
Topic
Author
Date
High
OpenEDX platform Ironwood 2.5 Remote Code Execution
Daniel Monzón
22.05.2020

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.5/10
6.4/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
EDX -> Open edx platform 

 References:
http://packetstormsecurity.com/files/157785/OpenEDX-Ironwood-2.5-Remote-Code-Execution.html
https://edx.readthedocs.io/projects/edx-developer-guide/en/latest/architecture.html
https://stark0de.com/2020/05/17/openedx-vulnerabilities.html

Copyright 2024, cxsecurity.com

 

Back to Top