Lucene search

K
githubGitHub Advisory DatabaseGHSA-22GJ-8QJ2-FJ46
HistoryMay 02, 2023 - 9:31 p.m.

Moodle External Control of File Name or Path vulnerability

2023-05-0221:31:48
CWE-73
CWE-610
GitHub Advisory Database
github.com
17
moodle
external control
file name
path
vulnerability
http request
arbitrary folders
system

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.016 Low

EPSS

Percentile

87.6%

The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.

Affected configurations

Vulners
Node
moodlemoodleRange<4.2.0-rc2
CPENameOperatorVersion
moodle/moodlelt4.2.0-rc2

References

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

0.016 Low

EPSS

Percentile

87.6%