Lucene search

K
githubGitHub Advisory DatabaseGHSA-C7JJ-VFMR-J9MJ
HistoryMay 24, 2022 - 7:06 p.m.

Moodle command execution vulnerability exists in the default legacy spellchecker plugin

2022-05-2419:06:04
CWE-732
GitHub Advisory Database
github.com
15
moodle
command execution
vulnerability
legacy spellchecker
http requests
administrator privileges

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

EPSS

0.052

Percentile

93.1%

A command execution vulnerability exists in the default legacy spellchecker plugin in a few Moodle multiple specific versions. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.

Affected configurations

Vulners
Node
moodlemoodleMatch3.8.0
OR
moodlemoodleMatch3.11.2
OR
moodlemoodleMatch3.10.0
VendorProductVersionCPE
moodlemoodle3.8.0cpe:2.3:a:moodle:moodle:3.8.0:*:*:*:*:*:*:*
moodlemoodle3.11.2cpe:2.3:a:moodle:moodle:3.11.2:*:*:*:*:*:*:*
moodlemoodle3.10.0cpe:2.3:a:moodle:moodle:3.10.0:*:*:*:*:*:*:*

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

7.4

Confidence

Low

EPSS

0.052

Percentile

93.1%