moodle/moodle is vulnerable to SQL Injection attacks. The vulnerability exists in get_subwiki_pages
function of external.php
due to lack of sanitization of user inputs which allows an attacker to inject and execute arbitrary sql queries.
CPE | Name | Operator | Version |
---|---|---|---|
moodle/moodle | le | v4.2.0-rc1 | |
moodle/moodle | le | v4.2.0-rc1 |
git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
bugzilla.redhat.com/show_bug.cgi?id=2188606
git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
github.com/advisories/GHSA-7mmc-22g7-3xq2
github.com/moodle/moodle/commit/5521d1d6e8bb8bebb76ad8154095f6b18ea26e7f
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/
lists.fedoraproject.org/archives/list/[email protected]/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/
lists.fedoraproject.org/archives/list/[email protected]/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/
lists.fedoraproject.org/archives/list/[email protected]/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/
moodle.org/mod/forum/discuss.php?d=446286