Описание
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
Релиз | Статус | Примечание |
---|---|---|
artful | ignored | end of life |
bionic | not-affected | 2.7.3 |
cosmic | not-affected | 2.7.3 |
devel | not-affected | 2.7.3 |
disco | not-affected | 2.7.3 |
esm-apps/bionic | not-affected | 2.7.3 |
esm-apps/xenial | not-affected | 2.7.3 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needed] |
lucid | ignored | end of life |
precise | ignored | end of life |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x bef ...
Moodle allows attackers to trigger the generation of arbitrary messages
EPSS
5 Medium
CVSS2