{"id":"CVE-2023-34598","details":"Gibbon v25.0.0 is vulnerable to a Local File Inclusion (LFI) where it's possible to include the content of several files present in the installation folder in the server's response.","modified":"2026-05-18T05:56:38.123192523Z","published":"2023-06-29T00:00:00Z","database_specific":{"cna_assigner":"mitre","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/34xxx/CVE-2023-34598.json"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/34xxx/CVE-2023-34598.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34598"},{"type":"PACKAGE","url":"https://github.com/maddsec/CVE-2023-34598"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gibbonedu/core","events":[{"introduced":"0"},{"last_affected":"a563d781ae7202d5d14ec6bbbbba08bbda0e3e4d"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:gibbonedu:gibbon:25.0.00:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"25.0.00"}]}}],"versions":["v25.0.00","v24.0.01","v24.0.00","v23.0.00","test-tag-5","test-tag-4","test-tag-3b","v22.0.00-pre","v22.0.00","v23.0.00-testbuild2","v21.0.00","v20.0.00","v19.0.00","v18.0.01","v18.0.00","v17.0.00","v16.0.01","v16.0.00","v15.0.01","v15.0.00","v14.0.01","v14.0.00","PR_Timetable_Tools","PR_Markbook_Sidebar","PR_Attendance","v12.0.00","v11.0.00","v10.0.00","v9.1.00","v9.0.00","v8.3.00","v8.2.00","v8.1.00","v8.0.06","v8.0.05","v8.0.04","v8.0.03","v8.0.02","v8.0.01","v8.0.00","v7.1.02","v7.1.01","v7.1.00","v7.0.01","v7.0.00"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-34598.json"}}],"schema_version":"1.7.5"}