Lucene search

K

Moodle <= 4.2.5 Improper Access Control Vulnerability

🗓️ 13 Feb 2024 00:00:00Reported by Copyright (C) 2024 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 10 Views

Moodle <= 4.2.5 Improper Access Control Vulnerability. Allows local user to create arbitrary events & add to calendar without consent

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Vulnrichment
CVE-2024-1439 Inadequate access control vulnerability in Moodle
12 Feb 202410:51
vulnrichment
NVD
CVE-2024-1439
12 Feb 202411:15
nvd
Veracode
Inadequate Access Control
13 Feb 202407:52
veracode
UbuntuCve
CVE-2024-1439
12 Feb 202400:00
ubuntucve
OSV
BIT-MOODLE-2024-1439
11 Oct 202407:11
osv
OSV
Moodle Improper Access Control vulnerability
12 Feb 202412:30
osv
CVE
CVE-2024-1439
12 Feb 202411:15
cve
Prion
Design/Logic Flaw
12 Feb 202411:15
prion
Cvelist
CVE-2024-1439 Inadequate access control vulnerability in Moodle
12 Feb 202410:51
cvelist
Github Security Blog
Moodle Improper Access Control vulnerability
12 Feb 202412:30
github
Rows per page
# SPDX-FileCopyrightText: 2024 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:moodle:moodle";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.126582");
  script_version("2025-02-13T05:37:41+0000");
  script_tag(name:"last_modification", value:"2025-02-13 05:37:41 +0000 (Thu, 13 Feb 2025)");
  script_tag(name:"creation_date", value:"2024-02-13 09:31:42 +0000 (Tue, 13 Feb 2024)");
  script_tag(name:"cvss_base", value:"1.7");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:S/C:N/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-10-10 13:55:20 +0000 (Thu, 10 Oct 2024)");

  script_cve_id("CVE-2024-1439");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"WillNotFix");

  script_name("Moodle <= 4.2.5 Improper Access Control Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2024 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_moodle_cms_detect.nasl");
  script_mandatory_keys("moodle/detected");

  script_tag(name:"summary", value:"Moodle is prone to an improper access control vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"It is possible for a local user with a student role to create
  arbitrary events intended for users with higher roles. It could also allow the attacker to add
  events to the calendar of all users without their prior consent.");

  script_tag(name:"affected", value:"Moodle version 4.2.5 and prior.");

  # nb: You can check e.g. here if there are any updates available:
  # - https://moodle.org/search/index.php?q=%22CVE-2024-1439%22
  # - https://moodle.org/mod/forum/view.php?id=7128
  # - https://moodle.org/mod/forum/search.php?id=1&words=CVE-2024-1439
  script_tag(name:"solution", value:"No known solution was made available for at least one year since the disclosure
  of this vulnerability. Likely none will be provided anymore. General solution options are to upgrade to a newer
  release, disable respective features, remove the product or replace the product by another one.");

  script_xref(name:"URL", value:"https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-vulnerability-moodle");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_is_less_equal(version: version, test_version: "4.2.5")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "None", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(0);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Feb 2024 00:00Current
5.1Medium risk
Vulners AI Score5.1
CVSS33.3 - 6.5
EPSS0.00043
SSVC
10
.json
Report