Vulnerability Name: | CVE-2018-14630 (CCN-150086) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-09-17 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-09-17 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
Summary: | moodle before versions 3.5.2, 3.4.5, 3.3.8, 3.1.14 is vulnerable to an XML import of ddwtos could lead to intentional remote code execution. When importing legacy 'drag and drop into text' (ddwtos) type quiz questions, it was possible to inject and execute PHP code from within the imported questions, either intentionally or by importing questions from an untrusted source. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.9 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-14630 Source: CONFIRM Type: Patch, Vendor Advisory http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62880 Source: BID Type: Third Party Advisory, VDB Entry 105354 Source: CCN Type: BID-105354 Moodle CVE-2018-14630 Remote Code Execution Vulnerability Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14630 Source: XF Type: UNKNOWN moodle-cve201814630-code-exec(150086) Source: CCN Type: Moodle Security Advisory MSA-18-0017 Moodle XML import of ddwtos could lead to intentional remote code execution Source: CONFIRM Type: Patch, Vendor Advisory https://moodle.org/mod/forum/discuss.php?d=376023 Source: CCN Type: Packet Storm Security [09-19-2018] Moodle 3.x PHP Unserialize Remote Code Execution Source: CCN Type: Full-Disclosure Mailing List, Tue, 18 Sep 2018 13:18:30 +0200 SEC Consult SA-20180918-0 Remote Code Execution via PHP unserialize in Moodle open-source learning platform Source: FULLDISC Type: Exploit, Mailing List, Third Party Advisory 20180918 SEC Consult SA-20180918-0 :: Remote Code Execution via PHP unserialize in Moodle open-source learning platform Source: MISC Type: Exploit, Third Party Advisory https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-unserialize-moodle-open-source-learning-platform-cve-2018-14630/ Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-14630 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |