Lucene search

K
githubGitHub Advisory DatabaseGHSA-C87J-9RRQ-H3J8
HistoryMay 13, 2022 - 1:12 a.m.

Moodle allows attackers to trigger the generation of arbitrary messages

2022-05-1301:12:43
CWE-20
GitHub Advisory Database
github.com
7
moodle
lti module
arbitrary messages
remote attackers
parameters restrictions
modified url

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.004

Percentile

72.2%

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

Affected configurations

Vulners
Node
moodlemoodleRange<2.7.3
OR
moodlemoodleRange<2.6.6
OR
moodlemoodleRange<2.5.9
VendorProductVersionCPE
moodlemoodle*cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

7.3

Confidence

High

EPSS

0.004

Percentile

72.2%