CVE-2022-39367: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in davemckain qtiworks
QTIWorks is a software suite for standards-based assessment delivery. Prior to version 1.0-beta15, the QTIWorks Engine allows users to upload QTI content packages as ZIP files. The ZIP handling code does not sufficiently check the paths of files contained within ZIP files, so can insert files into other locations in the filesystem if they are writable by the process running the QTIWorks Engine. In extreme cases, this could allow anonymous users to change files in arbitrary locations in the filesystem. In normal QTIWorks Engine deployments, the impact is somewhat reduced because the default QTIWorks configuration does not enable the public demo functionality, so ZIP files can only be uploaded by users with "instructor" privileges. This vulnerability is fixed in version 1.0-beta15. There are no database configuration changes required when upgrading to this version. No known workarounds for this issue exist.
AI Analysis
Technical Summary
CVE-2022-39367 is a path traversal vulnerability affecting versions of the QTIWorks Engine prior to 1.0-beta15. QTIWorks is a software suite designed for standards-based assessment delivery, commonly used in educational environments to manage and deliver QTI (Question and Test Interoperability) content packages. The vulnerability arises from insufficient validation of file paths within ZIP files uploaded to the system. Specifically, the ZIP handling code does not adequately restrict or sanitize the paths of files contained in uploaded ZIP archives. This flaw allows an attacker to craft a malicious ZIP file containing file entries with path traversal sequences (e.g., "../") that can cause the extraction process to write files outside the intended directory. If the QTIWorks Engine process has write permissions on these arbitrary filesystem locations, an attacker could overwrite or create files anywhere writable by the process. In the worst case, this could lead to arbitrary file modification or insertion, potentially enabling code execution or system compromise. However, the impact is somewhat mitigated in typical deployments because the default configuration disables public demo functionality, restricting ZIP uploads to authenticated users with "instructor" privileges. This limits the attack surface to trusted users rather than anonymous attackers. The vulnerability was addressed in version 1.0-beta15 by implementing proper path validation and sanitization during ZIP extraction. No database or configuration changes are required to apply the fix, and no known workarounds exist. There are no known exploits in the wild at this time. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), a common and well-understood category of path traversal issues.
Potential Impact
For European organizations, especially educational institutions and assessment providers using QTIWorks, this vulnerability poses a risk of unauthorized file system modification. If exploited, it could allow an attacker with instructor-level access to overwrite critical files, potentially leading to denial of service, data integrity compromise, or even remote code execution depending on the writable directories and files affected. The confidentiality of assessment content and user data could also be at risk if files containing sensitive information are overwritten or replaced. Since the vulnerability requires authenticated instructor privileges in typical configurations, the risk from external anonymous attackers is limited, but insider threats or compromised instructor accounts could be leveraged. The impact is heightened in environments where QTIWorks is deployed with less restrictive configurations or where the underlying operating system permissions are overly permissive. Given the critical role of assessment platforms in education and certification, disruption or manipulation of these systems could have significant operational and reputational consequences for affected organizations.
Mitigation Recommendations
1. Immediate upgrade to QTIWorks version 1.0-beta15 or later to apply the official patch that fixes the path traversal vulnerability. 2. Review and tighten file system permissions for the QTIWorks Engine process to ensure it only has write access to necessary directories, minimizing the potential impact of path traversal exploitation. 3. Restrict ZIP file upload capabilities strictly to trusted users and consider additional authentication or multi-factor authentication for instructor accounts to reduce the risk of credential compromise. 4. Implement monitoring and alerting for unusual file system changes in directories writable by QTIWorks, enabling early detection of potential exploitation attempts. 5. Conduct regular audits of QTIWorks configurations to ensure public demo or anonymous upload functionalities remain disabled unless explicitly required and secured. 6. If upgrading immediately is not feasible, consider isolating the QTIWorks environment using containerization or sandboxing techniques to limit filesystem exposure. 7. Educate instructors and administrators on secure handling of assessment content and the importance of safeguarding their credentials.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden, Belgium, Poland, Finland
CVE-2022-39367: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in davemckain qtiworks
Description
QTIWorks is a software suite for standards-based assessment delivery. Prior to version 1.0-beta15, the QTIWorks Engine allows users to upload QTI content packages as ZIP files. The ZIP handling code does not sufficiently check the paths of files contained within ZIP files, so can insert files into other locations in the filesystem if they are writable by the process running the QTIWorks Engine. In extreme cases, this could allow anonymous users to change files in arbitrary locations in the filesystem. In normal QTIWorks Engine deployments, the impact is somewhat reduced because the default QTIWorks configuration does not enable the public demo functionality, so ZIP files can only be uploaded by users with "instructor" privileges. This vulnerability is fixed in version 1.0-beta15. There are no database configuration changes required when upgrading to this version. No known workarounds for this issue exist.
AI-Powered Analysis
Technical Analysis
CVE-2022-39367 is a path traversal vulnerability affecting versions of the QTIWorks Engine prior to 1.0-beta15. QTIWorks is a software suite designed for standards-based assessment delivery, commonly used in educational environments to manage and deliver QTI (Question and Test Interoperability) content packages. The vulnerability arises from insufficient validation of file paths within ZIP files uploaded to the system. Specifically, the ZIP handling code does not adequately restrict or sanitize the paths of files contained in uploaded ZIP archives. This flaw allows an attacker to craft a malicious ZIP file containing file entries with path traversal sequences (e.g., "../") that can cause the extraction process to write files outside the intended directory. If the QTIWorks Engine process has write permissions on these arbitrary filesystem locations, an attacker could overwrite or create files anywhere writable by the process. In the worst case, this could lead to arbitrary file modification or insertion, potentially enabling code execution or system compromise. However, the impact is somewhat mitigated in typical deployments because the default configuration disables public demo functionality, restricting ZIP uploads to authenticated users with "instructor" privileges. This limits the attack surface to trusted users rather than anonymous attackers. The vulnerability was addressed in version 1.0-beta15 by implementing proper path validation and sanitization during ZIP extraction. No database or configuration changes are required to apply the fix, and no known workarounds exist. There are no known exploits in the wild at this time. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory), a common and well-understood category of path traversal issues.
Potential Impact
For European organizations, especially educational institutions and assessment providers using QTIWorks, this vulnerability poses a risk of unauthorized file system modification. If exploited, it could allow an attacker with instructor-level access to overwrite critical files, potentially leading to denial of service, data integrity compromise, or even remote code execution depending on the writable directories and files affected. The confidentiality of assessment content and user data could also be at risk if files containing sensitive information are overwritten or replaced. Since the vulnerability requires authenticated instructor privileges in typical configurations, the risk from external anonymous attackers is limited, but insider threats or compromised instructor accounts could be leveraged. The impact is heightened in environments where QTIWorks is deployed with less restrictive configurations or where the underlying operating system permissions are overly permissive. Given the critical role of assessment platforms in education and certification, disruption or manipulation of these systems could have significant operational and reputational consequences for affected organizations.
Mitigation Recommendations
1. Immediate upgrade to QTIWorks version 1.0-beta15 or later to apply the official patch that fixes the path traversal vulnerability. 2. Review and tighten file system permissions for the QTIWorks Engine process to ensure it only has write access to necessary directories, minimizing the potential impact of path traversal exploitation. 3. Restrict ZIP file upload capabilities strictly to trusted users and consider additional authentication or multi-factor authentication for instructor accounts to reduce the risk of credential compromise. 4. Implement monitoring and alerting for unusual file system changes in directories writable by QTIWorks, enabling early detection of potential exploitation attempts. 5. Conduct regular audits of QTIWorks configurations to ensure public demo or anonymous upload functionalities remain disabled unless explicitly required and secured. 6. If upgrading immediately is not feasible, consider isolating the QTIWorks environment using containerization or sandboxing techniques to limit filesystem exposure. 7. Educate instructors and administrators on secure handling of assessment content and the importance of safeguarding their credentials.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9849c4522896dcbf6a8b
Added to database: 5/21/2025, 9:09:29 AM
Last enriched: 6/21/2025, 10:59:53 PM
Last updated: 8/13/2025, 6:44:50 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.