Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9060

Опубликовано: 24 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
moodlefixed2.7.5+dfsg-1package
moodleend-of-lifesqueezepackage

Примечания

  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47927

  • https://moodle.org/mod/forum/discuss.php?d=275165

EPSS

Процентиль: 59%
0.00388
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

nvd
почти 11 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

github
больше 3 лет назад

Moodle allows attackers to trigger the generation of arbitrary messages

EPSS

Процентиль: 59%
0.00388
Низкий