The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.
References
Link | Resource |
---|---|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029 | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=2106274 | Issue Tracking Third Party Advisory |
https://moodle.org/mod/forum/discuss.php?d=436457 | Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/ | Mailing List Third Party Advisory |
Information
Published : 2022-07-25 09:15
Updated : 2022-08-01 11:34
NVD link : CVE-2022-35650
Mitre link : CVE-2022-35650
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
moodle
- moodle
fedoraproject
- fedora