Description
Autolab is a course management service that enables auto-graded programming assignments. A Tar slip vulnerability was found in the Install assessment functionality of Autolab. To exploit this vulnerability an authenticated attacker with instructor permissions needs to upload a specially crafted Tar file. Using the install assessment functionality an attacker can feed a Tar file that contain files with paths pointing outside of the target directory (e.g., `../../../../tmp/tarslipped1.sh`). When the Install assessment form is submitted the files inside of the archives are expanded to the attacker-chosen locations. This issue has been addressed in version 2.11.0. Users are advised to upgrade.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://github.com/autolab/Autolab/security/advisories/GHSA-x9hj-r9q4-832c
Patch x_refsource_misc
https://github.com/autolab/Autolab/commit/14f508484a8323eceb0cf3a128573b43eabbc80d
Various Sources x_refsource_misc
https://securitylab.github.com/advisories/GHSL-2023-081_GHSL-2023-082_Autolab/
Scores
CVSS v3
6.7
EPSS
0.0039
EPSS Percentile
60.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-22
Status
published
Products (1)
autolabproject/autolab
< 2.11.0
Published
May 26, 2023
Tracked Since
Feb 18, 2026