Lucene search

K
githubGitHub Advisory DatabaseGHSA-MPHJ-H2FC-62X3
HistoryMay 13, 2022 - 1:12 a.m.

Moodle allows attackers to bypass the mod/lti:view capability requirement

2022-05-1301:12:41
GitHub Advisory Database
github.com
9
moodle
lti module
access control

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

50.4%

mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.

Affected configurations

Vulners
Node
moodlemoodleRange<2.7.3
OR
moodlemoodleRange<2.6.6
OR
moodlemoodleRange<2.5.9
VendorProductVersionCPE
moodlemoodle*cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

CVSS2

4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

AI Score

6.5

Confidence

Low

EPSS

0.001

Percentile

50.4%