moodle/moodle is vulnerable to Improper Access Control. The vulnerability exists in parse_file_information_from_url
function of lang.php
and loader.php
due to improper folder restrictions which allows an attacker to send a specially crafted HTTP request and create arbitrary folders on the system.
CPE | Name | Operator | Version |
---|---|---|---|
moodle/moodle | le | v4.2.0-rc1 | |
moodle/moodle | le | v4.2.0-rc1 |
git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77718
bugzilla.redhat.com/show_bug.cgi?id=2188605
git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77718
github.com/advisories/GHSA-22gj-8qj2-fj46
github.com/moodle/moodle/commit/59d42e1ed23f916dcb47d53c745bef18a116d800
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/
lists.fedoraproject.org/archives/list/[email protected]/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/
lists.fedoraproject.org/archives/list/[email protected]/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/
lists.fedoraproject.org/archives/list/[email protected]/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/
moodle.org/mod/forum/discuss.php?d=446285