PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 529

of 27

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.3

When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.

Published:   Updated:

Vulnerability Type: Code injection

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v33.3

Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.

Published:   Updated:

Vulnerability Type: Remote code execution

Vendor(s):  Fedoraproject, Moodle
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Moodle, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

The course upload preview contained an XSS risk for users uploading unsafe data.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Fedoraproject, Moodle, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

Published:   Updated:

Vulnerability Type: Information disclosure

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

H5P metadata automatically populated the author with the user's username, which could be sensitive information.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Fedoraproject, Moodle, Redhat
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v34.3

Students in "Only see own membership" groups could see other students in the group, which should be hidden.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.

Published:   Updated:

Vulnerability Type: Remote code execution

Vendor(s):  Fedoraproject, Moodle
Significant
Remediate Within one Month
CVSS v2N/ACVSS v38.8

A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.

Published:   Updated:

Vulnerability Type: Remote code execution

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

** DISPUTED ** Moodle 4.3 allows /grade/report/grader/index.php?searchvalue= reflected XSS when logged in as a teacher. NOTE: the Moodle Security FAQ link states "Some forms of rich content [are] used by teachers to enhance their courses ... admins and teachers can post XSS-capable content, but students can not."

Published:   Updated:

Vulnerability Type: Server side request forgery (ssrf)

Vendor(s):  Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.3

A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.1

Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.

Published:   Updated:

Vulnerability Type: Cross site scripting

Vendor(s):  Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.4

** DISPUTED ** Moodle 3.10.1 is vulnerable to persistent/stored cross-site scripting (XSS) due to the improper input sanitization on the "Additional HTML Section" via "Header and Footer" parameter in /admin/settings.php. This vulnerability is leading an attacker to steal admin and all user account cookies by storing the malicious XSS payload in Header and Footer. NOTE: this is disputed by the vendor because the "Additional HTML Section" for "Header and Footer" can only be supplied by an administrator, who is intentionally allowed to enter unsanitized input (e.g., site-specific JavaScript).

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.3

The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.

Published:   Updated:

Vulnerability Type: Path traversal

Vendor(s):  Fedoraproject, Moodle
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.3

The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.

of 27