CVE-2020-37114
Unknown Unknown - Not Provided
Information Disclosure and Unauthorized Access in GUnet OpenEclass

Publication date: 2026-02-03

Last updated on: 2026-02-10

Assigner: VulnCheck

Description
GUnet OpenEclass 1.7.3 allows unauthenticated and authenticated users to access sensitive information, including system information, application version, and other students' uploaded assessments, due to improper access controls and information disclosure flaws in various modules. Attackers can retrieve system info, version info, and view or download other users' files without proper authorization.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2026-02-03
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gunet open_eclass_platform 1.7.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2020-37114 is an information disclosure vulnerability affecting GUnet OpenEclass version 1.7.3 and earlier, an e-learning platform.

The vulnerability arises from improper access controls and information disclosure flaws in multiple modules, which allow both unauthenticated and authenticated users to access sensitive information without proper authorization.

Attackers can retrieve system information, application version details, and view or download other users’ uploaded assessments and files.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive information, including system details, application version, and other users’ uploaded assessments.

Such exposure can compromise user privacy and system confidentiality, potentially allowing attackers to gain insights that could be used for further attacks or exploitation.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

[{'type': 'paragraph', 'content': "CVE-2020-37114 allows unauthorized access to sensitive information, including system details and other users' uploaded assessments, due to improper access controls and information disclosure flaws."}, {'type': 'paragraph', 'content': 'This exposure of sensitive data to unauthorized actors can potentially compromise user privacy and system confidentiality.'}, {'type': 'paragraph', 'content': 'Such unauthorized disclosure of personal or sensitive information may negatively impact compliance with common standards and regulations like GDPR and HIPAA, which require protection of personal data and confidentiality.'}] [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability involves improper access controls and information disclosure in GUnet OpenEclass 1.7.3 and earlier, allowing unauthorized access to system information, application version, and other users' uploaded assessments."}, {'type': 'paragraph', 'content': 'To detect this vulnerability on your system or network, you can attempt to access sensitive endpoints or files without authentication or with limited privileges to verify if unauthorized information disclosure is possible.'}, {'type': 'paragraph', 'content': 'Specific commands or tools are not provided in the available resources, but common approaches include using curl or wget to request URLs that should be protected, for example:'}, {'type': 'list_item', 'content': 'curl -I http://target-openeclass-server/path-to-assessments-or-system-info'}, {'type': 'list_item', 'content': 'curl http://target-openeclass-server/api/version'}, {'type': 'list_item', 'content': "Attempt to download other users' uploaded files by guessing or enumerating file paths."}, {'type': 'paragraph', 'content': 'Monitoring network traffic for unauthorized access attempts or unusual downloads of assessment files may also help detect exploitation.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps are not explicitly detailed in the provided resources.

However, general best practices to mitigate information disclosure vulnerabilities like CVE-2020-37114 include:

  • Restrict access controls to ensure that sensitive information and user files are only accessible to authorized users.
  • Apply patches or updates from the vendor if available to fix the improper access control issues.
  • Review and harden the configuration of the OpenEclass platform to limit exposure of sensitive endpoints.
  • Monitor logs and network traffic for suspicious access patterns.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart