Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-42700 | MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 04 Sep 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:markusproject:markus:*:*:*:*:*:*:*:* |
Mon, 18 Nov 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 18 Nov 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MarkUs, a web application for the submission and grading of student assignments, is vulnerable to path traversal in versions prior to 2.4.8. Authenticated instructors may download any file on the web server MarkUs is running on, depending on the file permissions. MarkUs v2.4.8 has addressed this issue. No known workarounds are available at the application level aside from upgrading. | |
| Title | MarkUs vulnerable to Path Traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-11-18T19:05:12.639Z
Reserved: 2024-10-03T14:06:12.638Z
Link: CVE-2024-47820
Updated: 2024-11-18T19:04:59.688Z
Status : Analyzed
Published: 2024-11-18T17:15:11.777
Modified: 2025-09-04T17:25:41.620
Link: CVE-2024-47820
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:15:40Z
EUVD