Moodle < 4.1.12 Multiple Vulnerabilities

high Web App Scanning Plugin ID 114719

Synopsis

Moodle < 4.1.12 Multiple Vulnerabilities

Description

According to its self-reported version, the Moodle install hosted on the remote host is 4.1.x prior to 4.1.12, 4.2.x prior to 4.2.9, 4.3.x prior to 4.3.6, or 4.4.x prior to 4.4.2. It is, therefore, affected by multiple vulnerabilities.

- A LFI vulnerability when restoring malformed block backups.

- A reflected XSS via H5P error message.

- An IDOR in Feedback non-respondents report allows messaging arbitrary site users.

- An XSS risk when restoring malicious course backup file.

- A site administration SQL injection via XMLDB editor.

- Can create global glossary without being admin.

- A CSRF risk in Feedback non-respondents report.

- Authorization headers preserved between "emulated redirects".

- An IDOR in badges allows deletion of arbitrary badges.

- User information visibility control issues in gradebook reports.

- Cache poisoning via injection into storage.

- Admin presets export tool includes some secrets that should not be exported.

- An arbitrary file read risk through pdfTeX.

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Moodle version 4.1.12 or latest.

See Also

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-64984

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79373

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79541

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81394

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81718

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82136

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82261

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82262

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82390

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82392

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82395

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82558

http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82745

https://moodle.org/mod/forum/discuss.php?d=461194#p1851864

https://moodle.org/mod/forum/discuss.php?d=461195#p1851865

https://moodle.org/mod/forum/discuss.php?d=461196#p1851867

https://moodle.org/mod/forum/discuss.php?d=461197#p1851868

https://moodle.org/mod/forum/discuss.php?d=461199#p1851870

https://moodle.org/mod/forum/discuss.php?d=461200#p1851871

https://moodle.org/mod/forum/discuss.php?d=461203#p1851874

https://moodle.org/mod/forum/discuss.php?d=461205#p1851876

https://moodle.org/mod/forum/discuss.php?d=461206#p1851878

https://moodle.org/mod/forum/discuss.php?d=461207#p1851879

https://moodle.org/mod/forum/discuss.php?d=461208#p1851880

https://moodle.org/mod/forum/discuss.php?d=461209#p1851881

https://moodle.org/mod/forum/discuss.php?d=461210#p1851882

Plugin Details

Severity: High

ID: 114719

Type: remote

Published: 4/10/2025

Updated: 4/10/2025

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2024-43436

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

CVSS Score Source: CVE-2024-43434

Vulnerability Information

CPE: cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 11/6/2024

Reference Information

CVE: CVE-2024-43426, CVE-2024-43427, CVE-2024-43428, CVE-2024-43429, CVE-2024-43431, CVE-2024-43432, CVE-2024-43434, CVE-2024-43435, CVE-2024-43436, CVE-2024-43437, CVE-2024-43438, CVE-2024-43439, CVE-2024-43440

CWE: 1287, 22, 312, 319, 345, 639, 754, 79, 862, 89, 922

OWASP: 2010-A1, 2010-A2, 2010-A3, 2010-A4, 2010-A6, 2010-A8, 2010-A9, 2013-A1, 2013-A2, 2013-A3, 2013-A4, 2013-A5, 2013-A6, 2013-A7, 2013-A9, 2017-A1, 2017-A2, 2017-A3, 2017-A5, 2017-A6, 2017-A7, 2017-A9, 2021-A1, 2021-A2, 2021-A3, 2021-A4, 2021-A6, 2021-A8

WASC: Application Misconfiguration, Cross-Site Scripting, Improper Input Handling, Insufficient Authentication, Insufficient Authorization, Insufficient Transport Layer Protection, Path Traversal, SQL Injection

CAPEC: 10, 101, 102, 108, 109, 110, 111, 117, 120, 126, 13, 135, 14, 141, 142, 148, 209, 218, 24, 250, 267, 273, 28, 3, 34, 37, 383, 384, 385, 386, 387, 388, 42, 43, 45, 46, 47, 470, 477, 51, 52, 53, 588, 591, 592, 6, 63, 64, 65, 66, 67, 7, 71, 72, 76, 78, 79, 8, 80, 83, 84, 85, 9

DISA STIG: APSC-DV-000170, APSC-DV-000460, APSC-DV-002440, APSC-DV-002480, APSC-DV-002490, APSC-DV-002540, APSC-DV-002560, APSC-DV-002630

HIPAA: 164.306(a)(1), 164.306(a)(2), 164.312(a), 164.312(a)(1), 164.312(a)(2)(i), 164.312(e)

ISO: 27001-A.10.1, 27001-A.10.1.1, 27001-A.13.1.1, 27001-A.14.1.2, 27001-A.14.1.3, 27001-A.14.2.5, 27001-A.18.1.3, 27001-A.18.1.5, 27001-A.6.2.2, 27001-A.9.1.2, 27001-A.9.4.1, 27001-A.9.4.4, 27001-A.9.4.5

NIST: sp800_53-AC-3, sp800_53-CM-6b, sp800_53-SC-13, sp800_53-SC-24, sp800_53-SI-10, sp800_53-SI-10(5)

OWASP API: 2019-API7, 2019-API8, 2023-API8

OWASP ASVS: 4.0.2-12.3.1, 4.0.2-14.2.1, 4.0.2-3.5.3, 4.0.2-5.2.5, 4.0.2-5.3.3, 4.0.2-5.3.4, 4.0.2-8.2.1, 4.0.2-9.1.1

PCI-DSS: 3.2-2.2, 3.2-6.2, 3.2-6.5.1, 3.2-6.5.4, 3.2-6.5.7, 3.2-6.5.8