An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected.
References
Link | Resource |
---|---|
https://moodle.org/mod/forum/discuss.php?d=422308 | Patch Vendor Advisory |
https://moodle.org/mod/forum/discuss.php?d=422308 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://moodle.org/mod/forum/discuss.php?d=422308 - Patch, Vendor Advisory |
Information
Published : 2022-03-11 18:15
Updated : 2024-11-21 06:07
NVD link : CVE-2021-32474
Mitre link : CVE-2021-32474
CVE.ORG link : CVE-2021-32474
JSON object : View
Products Affected
moodle
- moodle
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')