Skip to content

Moodle allows attackers to trigger the generation of arbitrary messages

Moderate severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Jan 25, 2024

Package

composer moodle/moodle (Composer)

Affected versions

< 2.5.9
>= 2.6.0, < 2.6.6
>= 2.7.0, < 2.7.3

Patched versions

2.5.9
2.6.6
2.7.3

Description

The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.

References

Published by the National Vulnerability Database Nov 24, 2014
Published to the GitHub Advisory Database May 13, 2022
Reviewed Jan 25, 2024
Last updated Jan 25, 2024

Severity

Moderate

EPSS score

0.358%
(72nd percentile)

Weaknesses

CVE ID

CVE-2014-9060

GHSA ID

GHSA-c87j-9rrq-h3j8

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.