The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
References
Configurations
History
21 Nov 2024, 07:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044 - Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2106273 - Issue Tracking, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/ - | |
References | () https://moodle.org/mod/forum/discuss.php?d=436456 - Vendor Advisory |
07 Nov 2023, 03:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-07-25 16:15
Updated : 2024-11-21 07:11
NVD link : CVE-2022-35649
Mitre link : CVE-2022-35649
CVE.ORG link : CVE-2022-35649
JSON object : View
Products Affected
moodle
- moodle
fedoraproject
- fedora