Lucene search

K
githubGitHub Advisory DatabaseGHSA-M63H-Q4X3-6HWJ
HistoryMay 13, 2022 - 1:12 a.m.

Moodle is vulnerable to Improper Input Validation in MoodleQuickForm class

2022-05-1301:12:59
CWE-20
GitHub Advisory Database
github.com
7
moodle
vulnerable
input validation
remote attackers
crafted request
software

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.007

Percentile

80.2%

The MoodleQuickForm class in lib/formslib.php in Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly handle a certain array-element syntax, which allows remote attackers to bypass intended form-data filtering via a crafted request.

Affected configurations

Vulners
Node
moodlemoodleRange<2.2.10
OR
moodlemoodleRange2.4.02.4.4
OR
moodlemoodleRange2.3.02.3.7
VendorProductVersionCPE
moodlemoodle*cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.007

Percentile

80.2%