
Or, follow the instructions given by the ATutor Installer. Follow the installation instructions at the link above.ĥ. If you have a command line to work from, while located in the ATutor directory, create the file with:Ĥ. Before running the Installer, create an empty file in the ATutor/include/ directory. Clone ATutor from the fork you created into the document root of your webserver (for convenience), with:ģ. Fork ATutor into your own Github account, at:Ģ. Installing from a Github Clone (assuming you know Github)ġ.
Atutor zip install#
phtml.Ĭross-site scripting (XSS) vulnerability in popuphelp.php in ATutor 2.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the h parameter.To install ATutor, point your web browser to the installation directory where ATutor was extracted, and follow the Installer's instructions.Į.g. The $IllegalExtensions value only lists lowercase (and thus. The Upload Files section in the File Manager field contains an arbitrary file upload vulnerability via upload.php. It allows the user to run commands on the server with the teacher user privilege.
Atutor zip code#
This will allow for PHP files to be written to the web root, and for code to execute on the remote server.Īn issue was discovered in ATutor through 2.2.4.
Atutor zip zip#
An attacker can use the instructor account to fully compromise the system using a crafted backup ZIP archive. This may result in remote command execution. This occurs because install/include/header.php does not restrict certain changes (to db_host, db_login, db_password, and content_dir) within install/include/step5.php.ĪTutor through 2.2.4 is vulnerable to arbitrary file uploads via the mods/_core/backups/upload.php (aka backup) component. Next, he can change the directory that the application uploads files to, which allows him to achieve remote code execution. In ATutor 2.2.4, an unauthenticated attacker can change the application settings and force it to use his crafted database, which allows him to gain access to the application. ATutor versions 2.2.1 and earlier are vulnerable to a incorrect access control check vulnerability in the Alternative Content component resulting in privilege escalation. ATutor versions 2.2.1 and earlier are vulnerable to an incorrect access control check vulnerability in the Module component resulting in privilege escalation.



Multiple cross-site request forgery (CSRF) vulnerabilities in ATutor 2.2 allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator account via a request to mods/_core/users/admins/create.php or (2) create a user account via a request to mods/_core/users/create_user.php.Ĭonfirm.php in ATutor 2.2 and earlier allows remote attackers to bypass authentication and gain access as an existing user via the auto_login parameter.ĪTutor versions 2.2.1 and earlier are vulnerable to an incorrect access control check vulnerability in the Social Application component resulting in privilege escalation.
Atutor zip archive#
ATutor 2.2.4 allows Arbitrary File Upload and Directory Traversal, resulting in remote code execution via a "." pathname in a ZIP archive to the mods/_core/languages/language_import.php (aka Import New Language) or mods/_standard/patcher/index_admin.php (aka Patcher) component.Īn Access Control vulnerability exists in ATutor 2.2.4 in password_reminder.php when the g, id, h, form_password_hidden, and form_change HTTP POST parameters are set.Ī reflected cross site scripting (XSS) vulnerability in the / component of ATutor 2.2.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
