Vulnerability CVE-2013-3630


Published: 2013-10-31   Modified: 2013-11-01

Description:
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.

See advisories in our WLB2 database:
Topic
Author
Date
High
Moodle Remote Command Execution
Brandon Perry
31.10.2013
High
Moodle SpellChecker Path Authenticated Remote Command Execution
h00die
12.10.2021

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:H/Au:S/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.4/10
3.9/10
Exploit range
Attack complexity
Authentication
Remote
High
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Moodle -> Moodle 

 References:
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one

Copyright 2021, cxsecurity.com

 

Back to Top