Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c87j-9rrq-h3j8

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью

Описание

Moodle allows attackers to trigger the generation of arbitrary messages

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

Пакеты

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

< 2.5.9

2.5.9

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

>= 2.6.0, < 2.6.6

2.6.6

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

>= 2.7.0, < 2.7.3

2.7.3

EPSS

Процентиль: 59%
0.00388
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 10 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

nvd
больше 10 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

debian
больше 10 лет назад

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x bef ...

EPSS

Процентиль: 59%
0.00388
Низкий

Дефекты

CWE-20