Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mphj-h2fc-62x3

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью

Описание

Moodle allows attackers to bypass the mod/lti:view capability requirement

mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.

Пакеты

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

< 2.5.9

2.5.9

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

>= 2.6.0, < 2.6.6

2.6.6

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

>= 2.7.0, < 2.7.3

2.7.3

EPSS

Процентиль: 48%
0.00243
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.

nvd
больше 10 лет назад

mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.

debian
больше 10 лет назад

mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x b ...

EPSS

Процентиль: 48%
0.00243
Низкий