The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.
References
Configurations
History
21 Nov 2024, 07:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029 - Patch, Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2106274 - Issue Tracking, Third Party Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/ - | |
References | () https://moodle.org/mod/forum/discuss.php?d=436457 - Vendor Advisory |
07 Nov 2023, 03:49
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-07-25 16:15
Updated : 2024-11-21 07:11
NVD link : CVE-2022-35650
Mitre link : CVE-2022-35650
CVE.ORG link : CVE-2022-35650
JSON object : View
Products Affected
moodle
- moodle
fedoraproject
- fedora