Vulnerability Name:
CVE-2013-3630 (CCN-88432)
Assigned:
2013-10-30
Published:
2013-10-30
Updated:
2021-10-12
Summary:
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
CVSS v3 Severity:
4.6 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
Low
User Interaction (UI):
Required
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
Low
CVSS v2 Severity:
4.6 Medium
(CVSS v2 Vector:
AV:N/AC:H/Au:S/C:P/I:P/A:P
)
4.2 Medium
(Temporal CVSS v2 Vector:
AV:N/AC:H/Au:S/C:P/I:P/A:P/E:F/RL:U/RC:UR
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
High
Authentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
6.0 Medium
(CCN CVSS v2 Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P
)
5.4 Medium
(CCN Temporal CVSS v2 Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P/E:F/RL:U/RC:UR
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Medium
Athentication (Au):
Single_Instance
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Partial
Vulnerability Type:
CWE-94
Vulnerability Consequences:
Gain Privileges
References:
Source: MITRE
Type: CNA
CVE-2013-3630
Source: CCN
Type: Moodle Web Site
Moodle
Source: MISC
Type: UNKNOWN
http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html
Source: CCN
Type: BID-63449
Moodle Spellcheck Remote Command Execution Vulnerability
Source: CCN
Type: Metasploit Blog, Oct 30, 2013 12:10:20 PM
Adventures in FOSS Exploitation, Part One: Vulnerability Discovery
Source: MISC
Type: UNKNOWN
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one
Source: MISC
Type: Exploit
https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
Source: XF
Type: UNKNOWN
moodle-cve20133630-command-execution(88432)
Source: CCN
Type: Packet Storm Security [10-30-2013]
Moodle Remote Command Execution
Source: CCN
Type: Packet Storm Security [10-12-2021]
Moodle Authenticated Spelling Binary Remote Code Execution
Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [10-31-2013]
Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2013-3630
Vulnerable Configuration:
Configuration 1
:
cpe:/a:moodle:moodle:2.5.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.4.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.9:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.10:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.9:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.18:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.11:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.5.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.4.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.4.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.2.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.1.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.9:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.16:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.15:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.14:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.13:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.14:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.13:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.12:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.11:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.3.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.3.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.3.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.3.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.4.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.4.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.4.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.4.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.10:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.5.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.5:-:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.4.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.5.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.4.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.7:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.3.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.2.11:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.4:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.1.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.0.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.9:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.17:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.12:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.9.10:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.8:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.5.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.4.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.4.1:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.3.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:1.2.0:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:*:*:*:*:*:*:*:*
(Version <= 2.5.2)
Configuration CCN 1
:
cpe:/a:moodle:moodle:2.2.3:*:*:*:*:*:*:*
OR
cpe:/a:moodle:moodle:2.5.2:*:*:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:com.ubuntu.bionic:def:201336300000000
V
CVE-2013-3630 on Ubuntu 18.04 LTS (bionic) - medium.
2013-11-01
oval:com.ubuntu.xenial:def:201336300000000
V
CVE-2013-3630 on Ubuntu 16.04 LTS (xenial) - medium.
2013-11-01
oval:com.ubuntu.disco:def:201336300000000
V
CVE-2013-3630 on Ubuntu 19.04 (disco) - medium.
2013-11-01
oval:com.ubuntu.artful:def:20133630000
V
CVE-2013-3630 on Ubuntu 17.10 (artful) - medium.
2013-10-31
oval:com.ubuntu.trusty:def:20133630000
V
CVE-2013-3630 on Ubuntu 14.04 LTS (trusty) - medium.
2013-10-31
oval:com.ubuntu.bionic:def:20133630000
V
CVE-2013-3630 on Ubuntu 18.04 LTS (bionic) - medium.
2013-10-31
oval:com.ubuntu.xenial:def:20133630000
V
CVE-2013-3630 on Ubuntu 16.04 LTS (xenial) - medium.
2013-10-31
oval:com.ubuntu.cosmic:def:20133630000
V
CVE-2013-3630 on Ubuntu 18.10 (cosmic) - medium.
2013-10-31
oval:com.ubuntu.cosmic:def:201336300000000
V
CVE-2013-3630 on Ubuntu 18.10 (cosmic) - medium.
2013-10-31
oval:com.ubuntu.precise:def:20133630000
V
CVE-2013-3630 on Ubuntu 12.04 LTS (precise) - medium.
2013-10-31
BACK
moodle
moodle 2.5.0
moodle
moodle 2.4.1
moodle
moodle 2.3.8
moodle
moodle 2.3.1
moodle
moodle 2.2.9
moodle
moodle 2.2.2
moodle
moodle 2.2.10
moodle
moodle 2.1.7
moodle
moodle 2.1.5
moodle
moodle 2.0.9
moodle
moodle 2.0.7
moodle
moodle 2.0.0
moodle
moodle 1.9.8
moodle
moodle 1.9.3
moodle
moodle 1.9.18
moodle
moodle 1.9.11
moodle
moodle 1.9.1
moodle
moodle 1.8.4
moodle
moodle 1.8.2
moodle
moodle 1.8.10
moodle
moodle 1.6.7
moodle
moodle 1.6.0
moodle
moodle 1.5.2
moodle
moodle 1.4.4
moodle
moodle 1.4.2
moodle
moodle 1.2.1
moodle
moodle 1.1.1
moodle
moodle 2.3.6
moodle
moodle 2.3.5
moodle
moodle 2.3.4
moodle
moodle 2.3.3
moodle
moodle 2.2.1
moodle
moodle 2.2.0
moodle
moodle 2.1.9
moodle
moodle 2.1.8
moodle
moodle 2.0.6
moodle
moodle 2.0.5
moodle
moodle 2.0.4
moodle
moodle 2.0.3
moodle
moodle 2.0.2
moodle
moodle 1.9.16
moodle
moodle 1.9.15
moodle
moodle 1.9.14
moodle
moodle 1.9.13
moodle
moodle 1.8.14
moodle
moodle 1.8.13
moodle
moodle 1.8.12
moodle
moodle 1.8.11
moodle
moodle 1.6.5
moodle
moodle 1.6.4
moodle
moodle 1.6.3
moodle
moodle 1.6.2
moodle
moodle 1.3.4
moodle
moodle 1.3.3
moodle
moodle 1.3.2
moodle
moodle 1.3.1
moodle
moodle 2.4.5
moodle
moodle 2.4.4
moodle
moodle 2.4.3
moodle
moodle 2.4.2
moodle
moodle 2.2.8
moodle
moodle 2.2.7
moodle
moodle 2.2.6
moodle
moodle 2.2.5
moodle
moodle 2.2.4
moodle
moodle 2.1.3
moodle
moodle 2.1.2
moodle
moodle 2.1.10
moodle
moodle 2.1.1
moodle
moodle 1.9.7
moodle
moodle 1.9.6
moodle
moodle 1.9.5
moodle
moodle 1.9.4
moodle
moodle 1.8.9
moodle
moodle 1.8.8
moodle
moodle 1.8.7
moodle
moodle 1.8.6
moodle
moodle 1.7.5
moodle
moodle 1.7.4
moodle
moodle 1.7.3
moodle
moodle 1.7.2
moodle
moodle 1.5.1
moodle
moodle 1.5.0 beta
moodle
moodle 1.5
moodle
moodle 1.4.5
moodle
moodle 2.5.1
moodle
moodle 2.4.0
moodle
moodle 2.3.7
moodle
moodle 2.3.2
moodle
moodle 2.3.0
moodle
moodle 2.2.3
moodle
moodle 2.2.11
moodle
moodle 2.1.6
moodle
moodle 2.1.4
moodle
moodle 2.1.0
moodle
moodle 2.0.8
moodle
moodle 2.0.1
moodle
moodle 1.9.9
moodle
moodle 1.9.2
moodle
moodle 1.9.17
moodle
moodle 1.9.12
moodle
moodle 1.9.10
moodle
moodle 1.8.5
moodle
moodle 1.8.3
moodle
moodle 1.8.1
moodle
moodle 1.7.6
moodle
moodle 1.7.1
moodle
moodle 1.6.8
moodle
moodle 1.6.6
moodle
moodle 1.6.1
moodle
moodle 1.5.3
moodle
moodle 1.4.3
moodle
moodle 1.4.1
moodle
moodle 1.3.0
moodle
moodle 1.2.0
moodle
moodle *
moodle
moodle 2.2.3
moodle
moodle 2.5.2