Описание
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | not-affected | 2.7.5+dfsg-1 |
cosmic | not-affected | 2.7.5+dfsg-1 |
devel | not-affected | 2.7.5+dfsg-1 |
disco | not-affected | 2.7.5+dfsg-1 |
esm-apps/bionic | not-affected | 2.7.5+dfsg-1 |
esm-apps/xenial | not-affected | 2.7.5+dfsg-1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
lucid | ignored | end of life |
precise | ignored | end of life |
Показывать по
EPSS
4 Medium
CVSS2
Связанные уязвимости
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x b ...
Moodle allows attackers to bypass the mod/lti:view capability requirement
EPSS
4 Medium
CVSS2