Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-1096
Vulnerability from csaf_certbund
Published
2024-05-12 22:00
Modified
2024-06-04 22:00
Summary
Moodle: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Moodle ist ein Software-Paket, um internetbasierte Kurse zu entwickeln und durchzuführen. Es ist ein globales Softwareentwicklungsprojekt, das einen konstruktivistischen Lehr- und Lernansatz unterstützt.
Angriff
Ein entfernter Angreifer kann mehrere Schwachstellen in Moodle ausnutzen, um beliebigen Code auszuführen, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder einen Cross-Site Scripting (XSS)-Angriff durchzuführen.
Betroffene Betriebssysteme
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Moodle ist ein Software-Paket, um internetbasierte Kurse zu entwickeln und durchzuf\u00fchren. Es ist ein globales Softwareentwicklungsprojekt, das einen konstruktivistischen Lehr- und Lernansatz unterst\u00fctzt.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter Angreifer kann mehrere Schwachstellen in Moodle ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder einen Cross-Site Scripting (XSS)-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1096 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1096.json" }, { "category": "self", "summary": "WID-SEC-2024-1096 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1096" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0011 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458388" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0012 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458389" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0013 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458390" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0014 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458391" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0015 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458393" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0016 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458394" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0017 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458395" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0018 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458396" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0019 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458397" }, { "category": "external", "summary": "Moodle Security Advisory MSA-24-0020 vom 2024-05-12", "url": "https://moodle.org/mod/forum/discuss.php?d=458398" } ], "source_lang": "en-US", "title": "Moodle: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-06-04T22:00:00.000+00:00", "generator": { "date": "2024-08-15T18:08:48.430+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2024-1096", "initial_release_date": "2024-05-12T22:00:00.000+00:00", "revision_history": [ { "date": "2024-05-12T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-06-02T22:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2024-06-04T22:00:00.000+00:00", "number": "3", "summary": "CVE\u0027s erg\u00e4nzt" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c4.3.4", "product": { "name": "Open Source Moodle \u003c4.3.4", "product_id": "T034701" } }, { "category": "product_version_range", "name": "\u003c4.2.7", "product": { "name": "Open Source Moodle \u003c4.2.7", "product_id": "T034702" } }, { "category": "product_version_range", "name": "\u003c4.1.10", "product": { "name": "Open Source Moodle \u003c4.1.10", "product_id": "T034703" } } ], "category": "product_name", "name": "Moodle" } ], "category": "vendor", "name": "Open Source" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-33996", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-33996" }, { "cve": "CVE-2024-33997", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-33997" }, { "cve": "CVE-2024-33998", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-33998" }, { "cve": "CVE-2024-33999", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-33999" }, { "cve": "CVE-2024-34000", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34000" }, { "cve": "CVE-2024-34001", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34001" }, { "cve": "CVE-2024-34002", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34002" }, { "cve": "CVE-2024-34003", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34003" }, { "cve": "CVE-2024-34004", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34004" }, { "cve": "CVE-2024-34005", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34005" }, { "cve": "CVE-2024-34006", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34006" }, { "cve": "CVE-2024-34007", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34007" }, { "cve": "CVE-2024-34008", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34008" }, { "cve": "CVE-2024-34009", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in Moodle. Ursachen sind z. B. eine fehlende Bereinigung, ein unzureichender Token-Schutz oder eine unzureichende \u00dcberpr\u00fcfung. Ein entfernter authentifizierter oder anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, ReCAPTCHA zu umgehen, vertrauliche Informationen offenzulegen oder Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren. Einige dieser Schwachstellen erfordern eine Benutzerinteraktion, um erfolgreich ausgenutzt zu werden." } ], "release_date": "2024-05-12T22:00:00.000+00:00", "title": "CVE-2024-34009" } ] }
CVE-2024-34005 (GCVE-0-2024-34005)
Vulnerability from cvelistv5
Published
2024-05-31 20:27
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "custom" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "custom" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34005", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-03T19:36:05.573648Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T20:39:11.815Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458394" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Vincent Schneider" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eIn a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "In a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore database activity modules and direct access to the web server outside of the Moodle webroot could execute a local file include." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:27:45.704Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458394" } ], "title": "moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_data backup" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34005", "datePublished": "2024-05-31T20:27:45.704Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2024-08-02T02:42:59.871Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-33999 (GCVE-0-2024-33999)
Vulnerability from cvelistv5
Published
2024-05-31 19:53
Modified
2024-08-29 19:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
The referrer URL used by MFA required additional sanitizing, rather than being used directly.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.796Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458387" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-33999", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T19:55:30.477151Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-29T19:59:08.016Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Petr Skoda" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eThe referrer URL used by MFA required additional sanitizing, rather than being used directly.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "The referrer URL used by MFA required additional sanitizing, rather than being used directly." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T19:53:00.995Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458387" } ], "title": "moodle: unsafe direct use of $_SERVER[\u0027HTTP_REFERER\u0027] in admin/tool/mfa/index.php" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-33999", "datePublished": "2024-05-31T19:53:00.995Z", "dateReserved": "2024-04-29T13:02:30.266Z", "dateUpdated": "2024-08-29T19:59:08.016Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34000 (GCVE-0-2024-34000)
Vulnerability from cvelistv5
Published
2024-05-31 20:01
Modified
2024-11-14 20:50
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34000", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-07T16:24:48.794820Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-14T20:50:53.197Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458388" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Paul Holden" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "ID numbers displayed in the lesson overview report required additional sanitizing to prevent a stored XSS risk." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:01:11.769Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458388" } ], "title": "moodle: stored XSS in lesson overview report via user ID number" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34000", "datePublished": "2024-05-31T20:01:11.769Z", "dateReserved": "2024-04-29T13:02:30.266Z", "dateUpdated": "2024-11-14T20:50:53.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-33996 (GCVE-0-2024-33996)
Vulnerability from cvelistv5
Published
2024-05-31 19:29
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moodle:moodle:4.1.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moodle:moodle:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-33996", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-01T13:14:42.992969Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:43:56.027Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458384#p1840909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "packageName": "Moodle", "product": "Moodle", "vendor": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eIncorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Incorrect validation of allowed event types in a calendar web service made it possible for some users to create events with types/audiences they did not have permission to publish to." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T19:29:07.256Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458384#p1840909" } ], "title": "moodle: broken access control when setting calendar event type" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-33996", "datePublished": "2024-05-31T19:29:07.256Z", "dateReserved": "2024-04-29T13:02:30.265Z", "dateUpdated": "2024-08-02T02:42:59.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34003 (GCVE-0-2024-34003)
Vulnerability from cvelistv5
Published
2024-05-31 20:19
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moodle:moodle:4.1.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moodle:moodle:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34003", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-01T13:16:51.497571Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:41:47.991Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.891Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458391" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Vincent Schneider" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eIn a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "In a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore workshop modules and direct access to the web server outside of the Moodle webroot could execute a local file include." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:19:00.553Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458391" } ], "title": "moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_workshop backup" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34003", "datePublished": "2024-05-31T20:19:00.553Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2024-08-02T02:42:59.891Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34001 (GCVE-0-2024-34001)
Vulnerability from cvelistv5
Published
2024-05-31 20:06
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moodle:moodle:4.1.0:-:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:moodle:moodle:4.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2.0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34001", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-06-01T13:12:28.944186Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:42:15.218Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458389" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Paul Holden" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eActions in the admin preset tool did not include the necessary token to prevent a CSRF risk.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Actions in the admin preset tool did not include the necessary token to prevent a CSRF risk." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:06:48.288Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458389" } ], "title": "moodle: CSRF risk in admin preset tool management of presets" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34001", "datePublished": "2024-05-31T20:06:48.288Z", "dateReserved": "2024-04-29T13:02:30.266Z", "dateUpdated": "2024-08-02T02:42:59.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34007 (GCVE-0-2024-34007)
Vulnerability from cvelistv5
Published
2024-05-31 20:40
Modified
2024-11-21 19:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.3", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34007", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-21T19:13:49.037398Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-21T19:15:00.462Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.880Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458396" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Petr Skoda" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eThe logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "The logout option within MFA did not include the necessary token to avoid the risk of users inadvertently being logged out via CSRF." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:40:23.608Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458396" } ], "title": "moodle: logout CSRF in admin/tool/mfa/auth.php" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34007", "datePublished": "2024-05-31T20:40:23.608Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2024-11-21T19:15:00.462Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-33998 (GCVE-0-2024-33998)
Vulnerability from cvelistv5
Published
2024-05-31 19:46
Modified
2025-03-28 18:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-33998", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-03T14:26:53.695225Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-28T18:42:32.011Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.711Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458386" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aleksey Solovev" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eInsufficient escaping of participants\u0027 names in the participants page table resulted in a stored XSS risk when interacting with some features.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Insufficient escaping of participants\u0027 names in the participants page table resulted in a stored XSS risk when interacting with some features." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T19:46:13.685Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458386" } ], "title": "moodle: stored XSS via user\u0027s name on participants page when opening some options" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-33998", "datePublished": "2024-05-31T19:46:13.685Z", "dateReserved": "2024-04-29T13:02:30.266Z", "dateUpdated": "2025-03-28T18:42:32.011Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34009 (GCVE-0-2024-34009)
Vulnerability from cvelistv5
Published
2024-05-31 20:49
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "moodle", "vendor": "moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.3", "versionType": "semver" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34009", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-01T14:31:54.655618Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T14:32:40.175Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458398" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.3", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "caglaroflazoglu" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eInsufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Insufficient checks whether ReCAPTCHA was enabled made it possible to bypass the checks on the login page. This did not affect other pages where ReCAPTCHA is utilized." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:49:05.538Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458398" } ], "title": "moodle: ReCAPTCHA can be bypassed on the login page" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34009", "datePublished": "2024-05-31T20:49:05.538Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2024-08-02T02:42:59.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34008 (GCVE-0-2024-34008)
Vulnerability from cvelistv5
Published
2024-05-31 20:44
Modified
2025-03-25 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery (CSRF)
Summary
Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458397" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34008", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-05T19:22:27.983282Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-25T16:32:58.360Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Paul Holden" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eActions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:44:28.973Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458397" } ], "title": "moodle: CSRF risk in analytics management of models" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34008", "datePublished": "2024-05-31T20:44:28.973Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2025-03-25T16:32:58.360Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34002 (GCVE-0-2024-34002)
Vulnerability from cvelistv5
Published
2024-05-31 20:15
Modified
2024-10-31 17:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458390" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34002", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-12T17:56:11.457749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-31T17:56:04.621Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Vincent Schneider" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eIn a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "In a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore feedback modules and direct access to the web server outside of the Moodle webroot could execute a local file include." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:15:25.956Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458390" } ], "title": "moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_feedback backup" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34002", "datePublished": "2024-05-31T20:15:25.956Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2024-10-31T17:56:04.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34006 (GCVE-0-2024-34006)
Vulnerability from cvelistv5
Published
2024-05-31 20:36
Modified
2024-08-02 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-838 - Inappropriate Encoding for Output Context
Summary
The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "fedora", "vendor": "fedoraproject", "versions": [ { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34006", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-03T15:10:13.250364Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:42:30.475Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.940Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458395" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Leon Stringer" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eThe site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "The site log report required additional encoding of event descriptions to ensure any HTML in the content is displayed in plaintext instead of being rendered." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-838", "description": "CWE-838 Inappropriate Encoding for Output Context", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:36:08.390Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458395" } ], "title": "moodle: unsanitized HTML in site log for config_log_created" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34006", "datePublished": "2024-05-31T20:36:08.390Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2024-08-02T02:42:59.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-33997 (GCVE-0-2024-33997)
Vulnerability from cvelistv5
Published
2024-05-31 19:38
Modified
2024-11-21 15:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Summary
Additional sanitizing was required when opening the equation editor to prevent a stored XSS risk when editing another user's equation.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-33997", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-03T16:36:59.747514Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-21T15:01:26.728Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458385" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Aleksey Solovev" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eAdditional sanitizing was required when opening the equation editor to prevent a stored XSS risk when editing another user\u0027s equation.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "Additional sanitizing was required when opening the equation editor to prevent a stored XSS risk when editing another user\u0027s equation." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T19:38:17.633Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458385" } ], "title": "moodle: stored XSS risk when editing another user\u0027s equation in equation editor" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-33997", "datePublished": "2024-05-31T19:38:17.633Z", "dateReserved": "2024-04-29T13:02:30.266Z", "dateUpdated": "2024-11-21T15:01:26.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-34004 (GCVE-0-2024-34004)
Vulnerability from cvelistv5
Published
2024-05-31 20:23
Modified
2025-03-27 21:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Summary
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-34004", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-03T14:26:27.406959Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-27T21:12:35.694Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T02:42:59.771Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=458393" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "collectionURL": "https://git.moodle.org", "defaultStatus": "unknown", "packageName": "Moodle", "versions": [ { "lessThanOrEqual": "4.3.3", "status": "affected", "version": "4.0", "versionType": "semver" }, { "lessThanOrEqual": "4.2.6", "status": "affected", "version": "4.2", "versionType": "semver" }, { "lessThanOrEqual": "4.1.9", "status": "affected", "version": "4.1", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Vincent Schneider" } ], "datePublic": "2024-05-20T09:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cpre\u003eIn a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.\u003c/pre\u003e\u003cbr\u003e" } ], "value": "In a shared hosting environment that has been misconfigured to allow access to other users\u0027 content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-31T20:23:02.481Z", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "url": "https://moodle.org/mod/forum/discuss.php?d=458393" } ], "title": "moodle: authenticated LFI risk in some misconfigured shared hosting environments via modified mod_wiki backup" } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2024-34004", "datePublished": "2024-05-31T20:23:02.481Z", "dateReserved": "2024-04-29T13:02:30.267Z", "dateUpdated": "2025-03-27T21:12:35.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…