Vulnerability Details CVE-2024-38530
The Open eClass platform (formerly known as GUnet eClass) is a complete Course Management System. An arbitrary file upload vulnerability in the "save" functionality of the H5P module enables unauthenticated users to upload arbitrary files on the server's filesystem. This may lead in unrestricted RCE on the backend server, since the upload location is accessible from the internet. This vulnerability is fixed in 3.16.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 68.2%
CVSS Severity
CVSS v3 Score 9.8
Products affected by CVE-2024-38530
-
cpe:2.3:a:openeclass:openeclass:-
-
cpe:2.3:a:openeclass:openeclass:2.10.1
-
cpe:2.3:a:openeclass:openeclass:2.11.4
-
cpe:2.3:a:openeclass:openeclass:3.0
-
cpe:2.3:a:openeclass:openeclass:3.1
-
cpe:2.3:a:openeclass:openeclass:3.1.1
-
cpe:2.3:a:openeclass:openeclass:3.1.10
-
cpe:2.3:a:openeclass:openeclass:3.1.11
-
cpe:2.3:a:openeclass:openeclass:3.1.12
-
cpe:2.3:a:openeclass:openeclass:3.1.13
-
cpe:2.3:a:openeclass:openeclass:3.1.2
-
cpe:2.3:a:openeclass:openeclass:3.1.3
-
cpe:2.3:a:openeclass:openeclass:3.1.4
-
cpe:2.3:a:openeclass:openeclass:3.1.5
-
cpe:2.3:a:openeclass:openeclass:3.1.6
-
cpe:2.3:a:openeclass:openeclass:3.1.7
-
cpe:2.3:a:openeclass:openeclass:3.1.8
-
cpe:2.3:a:openeclass:openeclass:3.1.9
-
cpe:2.3:a:openeclass:openeclass:3.10
-
cpe:2.3:a:openeclass:openeclass:3.10.1
-
cpe:2.3:a:openeclass:openeclass:3.10.2
-
cpe:2.3:a:openeclass:openeclass:3.11
-
cpe:2.3:a:openeclass:openeclass:3.11.1
-
cpe:2.3:a:openeclass:openeclass:3.11.2
-
cpe:2.3:a:openeclass:openeclass:3.12
-
cpe:2.3:a:openeclass:openeclass:3.12.1
-
cpe:2.3:a:openeclass:openeclass:3.12.2
-
cpe:2.3:a:openeclass:openeclass:3.12.3
-
cpe:2.3:a:openeclass:openeclass:3.12.4
-
cpe:2.3:a:openeclass:openeclass:3.12.5
-
cpe:2.3:a:openeclass:openeclass:3.12.6
-
cpe:2.3:a:openeclass:openeclass:3.13
-
cpe:2.3:a:openeclass:openeclass:3.13.1
-
cpe:2.3:a:openeclass:openeclass:3.13.2
-
cpe:2.3:a:openeclass:openeclass:3.14
-
cpe:2.3:a:openeclass:openeclass:3.14.1
-
cpe:2.3:a:openeclass:openeclass:3.15
-
cpe:2.3:a:openeclass:openeclass:3.2
-
cpe:2.3:a:openeclass:openeclass:3.2.1
-
cpe:2.3:a:openeclass:openeclass:3.2.2
-
cpe:2.3:a:openeclass:openeclass:3.2.3
-
cpe:2.3:a:openeclass:openeclass:3.3
-
cpe:2.3:a:openeclass:openeclass:3.3.1
-
cpe:2.3:a:openeclass:openeclass:3.3.2
-
cpe:2.3:a:openeclass:openeclass:3.3.3
-
cpe:2.3:a:openeclass:openeclass:3.3.4
-
cpe:2.3:a:openeclass:openeclass:3.4
-
cpe:2.3:a:openeclass:openeclass:3.4.1
-
cpe:2.3:a:openeclass:openeclass:3.4.2
-
cpe:2.3:a:openeclass:openeclass:3.4.3
-
cpe:2.3:a:openeclass:openeclass:3.4.4
-
cpe:2.3:a:openeclass:openeclass:3.5.1
-
cpe:2.3:a:openeclass:openeclass:3.5.2
-
cpe:2.3:a:openeclass:openeclass:3.5.3
-
cpe:2.3:a:openeclass:openeclass:3.5.4
-
cpe:2.3:a:openeclass:openeclass:3.6.1
-
cpe:2.3:a:openeclass:openeclass:3.6.2
-
cpe:2.3:a:openeclass:openeclass:3.6.3
-
cpe:2.3:a:openeclass:openeclass:3.6.4
-
cpe:2.3:a:openeclass:openeclass:3.6.5
-
cpe:2.3:a:openeclass:openeclass:3.6.6
-
cpe:2.3:a:openeclass:openeclass:3.6.7
-
cpe:2.3:a:openeclass:openeclass:3.7
-
cpe:2.3:a:openeclass:openeclass:3.7.1
-
cpe:2.3:a:openeclass:openeclass:3.7.2
-
cpe:2.3:a:openeclass:openeclass:3.7.3
-
cpe:2.3:a:openeclass:openeclass:3.7.4
-
cpe:2.3:a:openeclass:openeclass:3.7.5
-
cpe:2.3:a:openeclass:openeclass:3.7.6
-
cpe:2.3:a:openeclass:openeclass:3.8
-
cpe:2.3:a:openeclass:openeclass:3.8.1
-
cpe:2.3:a:openeclass:openeclass:3.8.2
-
cpe:2.3:a:openeclass:openeclass:3.8.3
-
cpe:2.3:a:openeclass:openeclass:3.8.4
-
cpe:2.3:a:openeclass:openeclass:3.9
-
cpe:2.3:a:openeclass:openeclass:3.9.1
-
cpe:2.3:a:openeclass:openeclass:3.9.2
-
cpe:2.3:a:openeclass:openeclass:3.9.3