Описание
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | not-affected | 2.7.3 |
| cosmic | not-affected | 2.7.3 |
| devel | not-affected | 2.7.3 |
| disco | not-affected | 2.7.3 |
| esm-apps/bionic | not-affected | 2.7.3 |
| esm-apps/xenial | not-affected | 2.7.3 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
| lucid | ignored | end of life |
| precise | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x bef ...
Moodle allows attackers to trigger the generation of arbitrary messages
EPSS
5 Medium
CVSS2