The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
References
Link | Resource |
---|---|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044 | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2106273 | Issue Tracking Third Party Advisory |
https://moodle.org/mod/forum/discuss.php?d=436456 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/ | Mailing List Third Party Advisory |
Information
Published : 2022-07-25 09:15
Updated : 2022-08-01 11:30
NVD link : CVE-2022-35649
Mitre link : CVE-2022-35649
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
moodle
- moodle
fedoraproject
- fedora