OpenOlat is an open source web-based e-learning platform for teaching, learning, assessment and communication. By manually manipulating http requests when using the draw.io integration it is possible to read arbitrary files as the configured system user and SSRF. The problem is fixed in version 18.1.6 and 18.2.2. It is advised to upgrade to the latest version of 18.1.x or 18.2.x. Users unable to upgrade may work around this issue by disabling the Draw.io module or the entire REST API which will secure the system.
                
            Metrics
Affected Vendors & Products
References
        History
                    Thu, 10 Apr 2025 21:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Frentix Frentix openolat | |
| CPEs | cpe:2.3:a:frentix:openolat:*:*:*:*:*:*:*:* | |
| Vendors & Products | Frentix Frentix openolat | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-03-11T19:38:26.088Z
Updated: 2024-08-02T00:48:49.441Z
Reserved: 2024-03-06T17:35:00.860Z
Link: CVE-2024-28198
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-05-23T19:01:16.943Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2024-03-11T20:15:07.643
Modified: 2025-04-10T20:46:19.227
Link: CVE-2024-28198
 Redhat
                        Redhat
                    No data.