An issue in the jmpath variable in /modules/mindmap/index.php of GUnet Open eClass Platform (aka openeclass) v3.12.4 and below allows malicious users to read arbitrary files via a directory traversal.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
openeclass openeclass |