Skip to content

Arbitrary File Write leading up to remote code execution (from student accounts)

High
donny-wong published GHSA-j95p-7936-f75w Nov 18, 2024

Package

No package listed

Affected versions

< v2.4.8

Patched versions

v2.4.8 and above

Description

GitHub Security Lab (GHSL) Vulnerability Report:

  • Arbitrary File Write leading up to RCE in SubmissionsController (GHSL-2024-060)

Impact

An arbitrary file write vulnerability accessible via the update_files method of the SubmissionsController allows authenticated users (both students and instructors) to write arbitrary files to any location on the web server MarkUs is running on (depending on the permissions of the underlying filesystem). E.g. This can lead to a delayed remote code execution in case an attacker is able to write a Ruby file into the config/initializers/ subfolder of the Ruby on Rails application.

Patches

MarkUs v2.4.8 has addressed this issue.

Workarounds

In terms of application level, the best way is to upgrade.

References

#7026

Severity

High

CVE ID

CVE-2024-51499

Weaknesses

Credits