ALT-PU-2020-3235-1
Closed vulnerabilities
BDU:2022-04906
Уязвимость виртуальной обучающей среды moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию
BDU:2022-04907
Уязвимость реализации функции автоматического входа в систему с мобильных устройств виртуальной обучающей среды Moodle, позволяющая нарушителю провести фишинговую атаку и раскрыть защищаемую информацию
BDU:2022-04908
Уязвимость модуля LTI виртуальной обучающей среды Moodle, позволяющая нарушителю проводить фишинговые атаки или раскрыть защищаемую информацию
BDU:2022-06359
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной очисткой пользовательских данных, позволяющая нарушителю выполнить произвольные SQL-команды
BDU:2022-06382
Уязвимость плагина H5P виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-06383
Уязвимость виртуальной обучающей среды Moodle, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-06402
Уязвимость реализации функции рекурсивного рендеринга компонента Mustache helpers системы шаблонов Mustache template system виртуальной обучающей среды Moodle, позволяющая нарушителю проводить межсайтовые сценарные атаки или вызвать отказ в обслуживании
BDU:2022-06403
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-06405
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной проверкой входных данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-07405
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой источника HTTP-запроса в URL-адресе перенаправления курса, позволяющая нарушителю выполнять атаки с подделкой межсайтовых запросов
BDU:2022-07406
Уязвимость системы управления курсами Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)
BDU:2022-07408
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой введенных пользователем данных в библиотеке поставщика LTI, позволяющая нарушителю выполнять SSRF-атаки
BDU:2023-03462
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к ограниченным функциям
Modified: 2024-11-21
CVE-2020-25698
Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25699
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25700
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25701
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, and 3.10.
Modified: 2024-11-21
CVE-2020-25702
In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10.
Modified: 2024-11-21
CVE-2020-25703
The participants table download in Moodle always included user emails, but should have only done so when users' emails are not hidden. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5 and 3.7 to 3.7.8. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, and 3.10.
Modified: 2024-11-21
CVE-2022-35649
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044
- https://bugzilla.redhat.com/show_bug.cgi?id=2106273
- https://bugzilla.redhat.com/show_bug.cgi?id=2106273
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436456
- https://moodle.org/mod/forum/discuss.php?d=436456
Modified: 2024-11-21
CVE-2022-35650
The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029
- https://bugzilla.redhat.com/show_bug.cgi?id=2106274
- https://bugzilla.redhat.com/show_bug.cgi?id=2106274
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436457
- https://moodle.org/mod/forum/discuss.php?d=436457
Modified: 2024-11-21
CVE-2022-35651
A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921
- https://bugzilla.redhat.com/show_bug.cgi?id=2106275
- https://bugzilla.redhat.com/show_bug.cgi?id=2106275
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436458
- https://moodle.org/mod/forum/discuss.php?d=436458
Modified: 2024-11-21
CVE-2022-35652
An open redirect issue was found in Moodle due to improper sanitization of user-supplied data in mobile auto-login feature. A remote attacker can create a link that leads to a trusted website, however, when clicked, it redirects the victims to arbitrary URL/domain. Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72171
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72171
- https://bugzilla.redhat.com/show_bug.cgi?id=2106276
- https://bugzilla.redhat.com/show_bug.cgi?id=2106276
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436459
- https://moodle.org/mod/forum/discuss.php?d=436459
Modified: 2024-11-21
CVE-2022-35653
A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72299
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72299
- https://bugzilla.redhat.com/show_bug.cgi?id=2106277
- https://bugzilla.redhat.com/show_bug.cgi?id=2106277
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436460
- https://moodle.org/mod/forum/discuss.php?d=436460
Modified: 2025-02-20
CVE-2022-40208
In Moodle, insufficient limitations in some quiz web services made it possible for students to bypass sequential navigation during a quiz attempt.
Modified: 2024-11-21
CVE-2022-40313
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
Modified: 2024-11-21
CVE-2022-40314
A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified.
Modified: 2024-11-21
CVE-2022-40315
A limited SQL injection risk was identified in the "browse list of users" site administration page.
Modified: 2024-11-21
CVE-2022-40316
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
Modified: 2024-11-21
CVE-2022-45149
A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862
- https://bugzilla.redhat.com/show_bug.cgi?id=2142772
- https://bugzilla.redhat.com/show_bug.cgi?id=2142772
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440769
- https://moodle.org/mod/forum/discuss.php?d=440769
Modified: 2024-11-21
CVE-2022-45150
A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
- https://bugzilla.redhat.com/show_bug.cgi?id=2142773
- https://bugzilla.redhat.com/show_bug.cgi?id=2142773
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440770
- https://moodle.org/mod/forum/discuss.php?d=440770
Modified: 2024-11-21
CVE-2022-45152
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440772
- https://moodle.org/mod/forum/discuss.php?d=440772
Modified: 2024-11-21
CVE-2023-1402
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
Modified: 2024-11-21
CVE-2023-23921
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021
Modified: 2024-11-21
CVE-2023-23923
The vulnerability was found Moodle which exists due to insufficient limitations on the "start page" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862
- https://bugzilla.redhat.com/show_bug.cgi?id=2162549
- https://bugzilla.redhat.com/show_bug.cgi?id=2162549
- https://moodle.org/mod/forum/discuss.php?d=443274#p1782023
- https://moodle.org/mod/forum/discuss.php?d=443274#p1782023
Modified: 2024-11-21
CVE-2023-28329
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
Modified: 2024-11-21
CVE-2023-28330
Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
Modified: 2025-02-26
CVE-2023-28331
Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
Modified: 2024-11-21
CVE-2023-28332
If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.
Modified: 2024-11-21
CVE-2023-28333
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
Modified: 2024-11-21
CVE-2023-28336
Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
Modified: 2024-11-21
CVE-2023-30944
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- https://bugzilla.redhat.com/show_bug.cgi?id=2188606
- FEDORA-2023-0ab503de3d
- FEDORA-2023-60a90b6e6a
- FEDORA-2023-49eb814ccc
- https://moodle.org/mod/forum/discuss.php?d=446286
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- https://moodle.org/mod/forum/discuss.php?d=446286
- FEDORA-2023-49eb814ccc
- FEDORA-2023-60a90b6e6a
- FEDORA-2023-0ab503de3d
- https://bugzilla.redhat.com/show_bug.cgi?id=2188606
Modified: 2024-11-21
CVE-2023-35132
A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Modified: 2024-11-21
CVE-2023-35133
An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.