Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-9060

Опубликовано: 24 нояб. 2014
Источник: debian
EPSS Низкий

Описание

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
moodlefixed2.7.5+dfsg-1package
moodleend-of-lifesqueezepackage

Примечания

  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47927

  • https://moodle.org/mod/forum/discuss.php?d=275165

EPSS

Процентиль: 59%
0.00388
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

nvd
больше 10 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

github
около 3 лет назад

Moodle allows attackers to trigger the generation of arbitrary messages

EPSS

Процентиль: 59%
0.00388
Низкий