Vulnerability Details CVE-2024-24725
Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.776
EPSS Ranking 98.9%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2024-24725
-
cpe:2.3:a:gibbonedu:gibbon:10.0.00
-
cpe:2.3:a:gibbonedu:gibbon:11.0.00
-
cpe:2.3:a:gibbonedu:gibbon:12.0.00
-
cpe:2.3:a:gibbonedu:gibbon:13.0.00
-
cpe:2.3:a:gibbonedu:gibbon:13.0.01
-
cpe:2.3:a:gibbonedu:gibbon:13.0.02
-
cpe:2.3:a:gibbonedu:gibbon:14.0.00
-
cpe:2.3:a:gibbonedu:gibbon:14.0.01
-
cpe:2.3:a:gibbonedu:gibbon:15.0.00
-
cpe:2.3:a:gibbonedu:gibbon:15.0.01
-
cpe:2.3:a:gibbonedu:gibbon:16.0.00
-
cpe:2.3:a:gibbonedu:gibbon:16.0.01
-
cpe:2.3:a:gibbonedu:gibbon:17.0.00
-
cpe:2.3:a:gibbonedu:gibbon:18.0.00
-
cpe:2.3:a:gibbonedu:gibbon:18.0.01
-
cpe:2.3:a:gibbonedu:gibbon:19.0.00
-
cpe:2.3:a:gibbonedu:gibbon:20.0.00
-
cpe:2.3:a:gibbonedu:gibbon:21.0.00
-
cpe:2.3:a:gibbonedu:gibbon:21.0.01
-
cpe:2.3:a:gibbonedu:gibbon:22.0.00
-
cpe:2.3:a:gibbonedu:gibbon:22.0.01
-
cpe:2.3:a:gibbonedu:gibbon:23.0.00
-
cpe:2.3:a:gibbonedu:gibbon:23.0.01
-
cpe:2.3:a:gibbonedu:gibbon:23.0.02
-
cpe:2.3:a:gibbonedu:gibbon:24.0.00
-
cpe:2.3:a:gibbonedu:gibbon:24.0.01
-
cpe:2.3:a:gibbonedu:gibbon:25.0.00
-
cpe:2.3:a:gibbonedu:gibbon:25.0.01
-
cpe:2.3:a:gibbonedu:gibbon:7.0.00
-
cpe:2.3:a:gibbonedu:gibbon:7.0.01
-
cpe:2.3:a:gibbonedu:gibbon:7.1.00
-
cpe:2.3:a:gibbonedu:gibbon:7.1.01
-
cpe:2.3:a:gibbonedu:gibbon:7.1.02
-
cpe:2.3:a:gibbonedu:gibbon:8.0.00
-
cpe:2.3:a:gibbonedu:gibbon:8.0.01
-
cpe:2.3:a:gibbonedu:gibbon:8.0.02
-
cpe:2.3:a:gibbonedu:gibbon:8.0.03
-
cpe:2.3:a:gibbonedu:gibbon:8.0.04
-
cpe:2.3:a:gibbonedu:gibbon:8.0.05
-
cpe:2.3:a:gibbonedu:gibbon:8.0.06
-
cpe:2.3:a:gibbonedu:gibbon:8.1.00
-
cpe:2.3:a:gibbonedu:gibbon:8.2.00
-
cpe:2.3:a:gibbonedu:gibbon:8.3.00
-
cpe:2.3:a:gibbonedu:gibbon:9.0.00
-
cpe:2.3:a:gibbonedu:gibbon:9.1.00