Vulnerability Details CVE-2022-33116
An issue in the jmpath variable in /modules/mindmap/index.php of GUnet Open eClass Platform (aka openeclass) v3.12.4 and below allows attackers to read arbitrary files via a directory traversal.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 53.9%
CVSS Severity
CVSS v3 Score 6.5
CVSS v2 Score 3.5
Products affected by CVE-2022-33116
-
cpe:2.3:a:openeclass:openeclass:-
-
cpe:2.3:a:openeclass:openeclass:2.10.1
-
cpe:2.3:a:openeclass:openeclass:2.11.4
-
cpe:2.3:a:openeclass:openeclass:3.0
-
cpe:2.3:a:openeclass:openeclass:3.1
-
cpe:2.3:a:openeclass:openeclass:3.1.1
-
cpe:2.3:a:openeclass:openeclass:3.1.10
-
cpe:2.3:a:openeclass:openeclass:3.1.11
-
cpe:2.3:a:openeclass:openeclass:3.1.12
-
cpe:2.3:a:openeclass:openeclass:3.1.13
-
cpe:2.3:a:openeclass:openeclass:3.1.2
-
cpe:2.3:a:openeclass:openeclass:3.1.3
-
cpe:2.3:a:openeclass:openeclass:3.1.4
-
cpe:2.3:a:openeclass:openeclass:3.1.5
-
cpe:2.3:a:openeclass:openeclass:3.1.6
-
cpe:2.3:a:openeclass:openeclass:3.1.7
-
cpe:2.3:a:openeclass:openeclass:3.1.8
-
cpe:2.3:a:openeclass:openeclass:3.1.9
-
cpe:2.3:a:openeclass:openeclass:3.10
-
cpe:2.3:a:openeclass:openeclass:3.10.1
-
cpe:2.3:a:openeclass:openeclass:3.10.2
-
cpe:2.3:a:openeclass:openeclass:3.11
-
cpe:2.3:a:openeclass:openeclass:3.11.1
-
cpe:2.3:a:openeclass:openeclass:3.11.2
-
cpe:2.3:a:openeclass:openeclass:3.12
-
cpe:2.3:a:openeclass:openeclass:3.12.1
-
cpe:2.3:a:openeclass:openeclass:3.12.2
-
cpe:2.3:a:openeclass:openeclass:3.12.3
-
cpe:2.3:a:openeclass:openeclass:3.12.4
-
cpe:2.3:a:openeclass:openeclass:3.2
-
cpe:2.3:a:openeclass:openeclass:3.2.1
-
cpe:2.3:a:openeclass:openeclass:3.2.2
-
cpe:2.3:a:openeclass:openeclass:3.2.3
-
cpe:2.3:a:openeclass:openeclass:3.3
-
cpe:2.3:a:openeclass:openeclass:3.3.1
-
cpe:2.3:a:openeclass:openeclass:3.3.2
-
cpe:2.3:a:openeclass:openeclass:3.3.3
-
cpe:2.3:a:openeclass:openeclass:3.3.4
-
cpe:2.3:a:openeclass:openeclass:3.4
-
cpe:2.3:a:openeclass:openeclass:3.4.1
-
cpe:2.3:a:openeclass:openeclass:3.4.2
-
cpe:2.3:a:openeclass:openeclass:3.4.3
-
cpe:2.3:a:openeclass:openeclass:3.4.4
-
cpe:2.3:a:openeclass:openeclass:3.5.1
-
cpe:2.3:a:openeclass:openeclass:3.5.2
-
cpe:2.3:a:openeclass:openeclass:3.5.3
-
cpe:2.3:a:openeclass:openeclass:3.5.4
-
cpe:2.3:a:openeclass:openeclass:3.6.1
-
cpe:2.3:a:openeclass:openeclass:3.6.2
-
cpe:2.3:a:openeclass:openeclass:3.6.3
-
cpe:2.3:a:openeclass:openeclass:3.6.4
-
cpe:2.3:a:openeclass:openeclass:3.6.5
-
cpe:2.3:a:openeclass:openeclass:3.6.6
-
cpe:2.3:a:openeclass:openeclass:3.6.7
-
cpe:2.3:a:openeclass:openeclass:3.7
-
cpe:2.3:a:openeclass:openeclass:3.7.1
-
cpe:2.3:a:openeclass:openeclass:3.7.2
-
cpe:2.3:a:openeclass:openeclass:3.7.3
-
cpe:2.3:a:openeclass:openeclass:3.7.4
-
cpe:2.3:a:openeclass:openeclass:3.7.5
-
cpe:2.3:a:openeclass:openeclass:3.7.6
-
cpe:2.3:a:openeclass:openeclass:3.8
-
cpe:2.3:a:openeclass:openeclass:3.8.1
-
cpe:2.3:a:openeclass:openeclass:3.8.2
-
cpe:2.3:a:openeclass:openeclass:3.8.3
-
cpe:2.3:a:openeclass:openeclass:3.8.4
-
cpe:2.3:a:openeclass:openeclass:3.9
-
cpe:2.3:a:openeclass:openeclass:3.9.1
-
cpe:2.3:a:openeclass:openeclass:3.9.2
-
cpe:2.3:a:openeclass:openeclass:3.9.3