First published: Mon Sep 09 2019(Updated: )
In ATutor 2.2.4, an unauthenticated attacker can change the application settings and force it to use his crafted database, which allows him to gain access to the application. Next, he can change the directory that the application uploads files to, which allows him to achieve remote code execution. This occurs because install/include/header.php does not restrict certain changes (to db_host, db_login, db_password, and content_dir) within install/include/step5.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Atutor Atutor | <=2.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16114 is a vulnerability in ATutor 2.2.4 that allows an unauthenticated attacker to gain access and achieve remote code execution by manipulating application settings.
CVE-2019-16114 has a severity score of 9.8, making it a critical vulnerability.
To mitigate CVE-2019-16114, users should update ATutor to a patched version that addresses this vulnerability.