Summary
Detail | |||
---|---|---|---|
Vendor | Moodle | First view | 2016-02-22 |
Product | Moodle | Last view | 2024-11-18 |
Version | 2.7.10 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:moodle:moodle |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
4.3 | 2024-11-18 | CVE-2024-48901 | A vulnerability was found in Moodle. Additional checks are required to ensure users can only access the schedule of a report if they have permission to edit that report. |
4.3 | 2024-11-18 | CVE-2024-48898 | A vulnerability was found in Moodle. Users with access to delete audiences from reports could delete audiences from other reports that they do not have permission to delete from. |
4.3 | 2024-11-18 | CVE-2024-48897 | A vulnerability was found in Moodle. Additional checks are required to ensure users can only edit or delete RSS feeds that they have permission to modify. |
4.3 | 2024-11-18 | CVE-2024-48896 | A vulnerability was found in Moodle. It is possible for users with the "send message" capability to view other users' names that they may not otherwise have access to via an error message in Messaging. Note: The name returned follows the full name format configured on the site. |
8.8 | 2024-06-18 | CVE-2024-38276 | Incorrect CSRF token checks resulted in multiple CSRF risks. |
8.8 | 2024-05-31 | CVE-2024-34008 | Actions in the admin management of analytics models did not include the necessary token to prevent a CSRF risk. |
5.3 | 2024-02-19 | CVE-2024-25983 | Insufficient checks in a web service made it possible to add comments to the comments block on another user's dashboard when it was not otherwise available (e.g., on their profile page). |
8.8 | 2024-02-19 | CVE-2024-25982 | The link to update all installed language packs did not include the necessary token to prevent a CSRF risk. |
5.3 | 2024-02-19 | CVE-2024-25981 | Separate Groups mode restrictions were not honored when performing a forum export, which would export forum data for all groups. By default this only provided additional access to non-editing teachers. |
5.3 | 2024-02-19 | CVE-2024-25980 | Separate Groups mode restrictions were not honored in the H5P attempts report, which would display users from other groups. By default this only provided additional access to non-editing teachers. |
5.3 | 2024-02-19 | CVE-2024-25979 | The URL parameters accepted by forum search were not limited to the allowed parameters. |
7.5 | 2024-02-19 | CVE-2024-25978 | Insufficient file size checks resulted in a denial of service risk in the file picker's unzip functionality. |
3.3 | 2024-02-12 | CVE-2024-1439 | Inadequate access control in Moodle LMS. This vulnerability could allow a local user with a student role to create arbitrary events intended for users with higher roles. It could also allow the attacker to add events to the calendar of all users without their prior consent. |
3.3 | 2023-11-09 | CVE-2023-5551 | Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups. |
9.8 | 2023-11-09 | CVE-2023-5550 | In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution. |
5.3 | 2023-11-09 | CVE-2023-5549 | Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage. |
5.3 | 2023-11-09 | CVE-2023-5548 | Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection. |
6.1 | 2023-11-09 | CVE-2023-5547 | The course upload preview contained an XSS risk for users uploading unsafe data. |
5.4 | 2023-11-09 | CVE-2023-5546 | ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk. |
5.3 | 2023-11-09 | CVE-2023-5545 | H5P metadata automatically populated the author with the user's username, which could be sensitive information. |
5.4 | 2023-11-09 | CVE-2023-5544 | Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk. |
3.3 | 2023-11-09 | CVE-2023-5543 | When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting. |
6.1 | 2023-11-09 | CVE-2023-5541 | The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content. |
8.8 | 2023-11-09 | CVE-2023-5540 | A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers. |
8.8 | 2023-11-09 | CVE-2023-5539 | A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
26% (36) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
10% (14) | CWE-352 | Cross-Site Request Forgery (CSRF) |
10% (14) | CWE-200 | Information Exposure |
8% (12) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
5% (7) | CWE-264 | Permissions, Privileges, and Access Controls |
5% (7) | CWE-20 | Improper Input Validation |
4% (6) | CWE-668 | Exposure of Resource to Wrong Sphere |
3% (5) | CWE-284 | Access Control (Authorization) Issues |
3% (5) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
2% (4) | CWE-770 | Allocation of Resources Without Limits or Throttling |
2% (4) | CWE-639 | Access Control Bypass Through User-Controlled Key |
2% (4) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
2% (4) | CWE-269 | Improper Privilege Management |
1% (2) | CWE-434 | Unrestricted Upload of File with Dangerous Type |
1% (2) | CWE-345 | Insufficient Verification of Data Authenticity |
1% (2) | CWE-287 | Improper Authentication |
0% (1) | CWE-732 | Incorrect Permission Assignment for Critical Resource |
0% (1) | CWE-682 | Incorrect Calculation |
0% (1) | CWE-674 | Uncontrolled Recursion |
0% (1) | CWE-640 | Weak Password Recovery Mechanism for Forgotten Password |
0% (1) | CWE-610 | Externally Controlled Reference to a Resource in Another Sphere |
0% (1) | CWE-532 | Information Leak Through Log Files |
0% (1) | CWE-273 | Improper Check for Dropped Privileges |
0% (1) | CWE-209 | Information Exposure Through an Error Message |
0% (1) | CWE-116 | Improper Encoding or Escaping of Output |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-24 | Moodle 3.x PHP code injection attempt RuleID : 51143 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-24 | Moodle 3.x PHP code injection attempt RuleID : 51142 - Type : SERVER-WEBAPP - Revision : 1 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-f4910a3260.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-84a5340cc9.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-6a4a3b78fd.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-690535d30b.nasl - Type: ACT_GATHER_INFO |
2019-01-03 | Name: The remote Fedora host is missing a security update. File: fedora_2018-64955716d6.nasl - Type: ACT_GATHER_INFO |
2018-12-03 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_889e35f4f6a011e882dcfcaa147e860e.nasl - Type: ACT_GATHER_INFO |
2018-11-30 | Name: The remote Fedora host is missing a security update. File: fedora_2018-4ec3eecd7f.nasl - Type: ACT_GATHER_INFO |
2018-09-27 | Name: The remote Fedora host is missing a security update. File: fedora_2018-43ff5f6e5b.nasl - Type: ACT_GATHER_INFO |
2018-09-19 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_074cb225bb2d11e890e1fcaa147e860e.nasl - Type: ACT_GATHER_INFO |
2018-08-09 | Name: The remote Fedora host is missing a security update. File: fedora_2018-ebb1e572c0.nasl - Type: ACT_GATHER_INFO |
2018-04-02 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_cdb4d96234f911e892db080027907385.nasl - Type: ACT_GATHER_INFO |
2018-02-01 | Name: The remote Fedora host is missing a security update. File: fedora_2018-c587c0a62d.nasl - Type: ACT_GATHER_INFO |
2018-02-01 | Name: The remote Fedora host is missing a security update. File: fedora_2018-7e086e3309.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2017-612d3e009f.nasl - Type: ACT_GATHER_INFO |
2017-12-04 | Name: The remote Fedora host is missing a security update. File: fedora_2017-e40e02e0dd.nasl - Type: ACT_GATHER_INFO |
2017-12-01 | Name: The remote Fedora host is missing a security update. File: fedora_2017-475529a26a.nasl - Type: ACT_GATHER_INFO |
2017-07-17 | Name: The remote Fedora host is missing a security update. File: fedora_2017-d5dbc23747.nasl - Type: ACT_GATHER_INFO |
2017-05-30 | Name: The remote Fedora host is missing a security update. File: fedora_2017-4cc8d795e0.nasl - Type: ACT_GATHER_INFO |
2017-05-30 | Name: The remote Fedora host is missing a security update. File: fedora_2017-1f15fde598.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote Fedora host is missing a security update. File: fedora_2017-0196511d58.nasl - Type: ACT_GATHER_INFO |
2017-04-03 | Name: The remote Fedora host is missing a security update. File: fedora_2017-0fcaf52f1a.nasl - Type: ACT_GATHER_INFO |
2017-03-20 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_f72d98d10b7e11e7970f002590263bf5.nasl - Type: ACT_GATHER_INFO |
2017-02-07 | Name: The remote Fedora host is missing a security update. File: fedora_2017-ae7a707032.nasl - Type: ACT_GATHER_INFO |
2017-02-02 | Name: The remote Fedora host is missing a security update. File: fedora_2017-6681f94e10.nasl - Type: ACT_GATHER_INFO |
2016-11-25 | Name: The remote Fedora host is missing a security update. File: fedora_2016-4f7d4df7b3.nasl - Type: ACT_GATHER_INFO |