GHSA-vjxx-54vw-q59f

Suggest an improvement
Source
https://github.com/advisories/GHSA-vjxx-54vw-q59f
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-vjxx-54vw-q59f/GHSA-vjxx-54vw-q59f.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-vjxx-54vw-q59f
Aliases
Published
2022-05-14T01:17:52Z
Modified
2024-02-16T08:16:56.134044Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Moodle SSRF Vulnerability
Details

The edit_blog.php script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and more.

This kind of vulnerability is then called “blind” because of no response available on Moodle web site, enforcing attacker to exploit it using a “time based” approach.

Database specific
{
    "nvd_published_at": "2019-03-21T16:01:00Z",
    "cwe_ids": [
        "CWE-918"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-19T20:37:25Z"
}
References

Affected packages

Packagist / moodle/moodle

Package

Name
moodle/moodle
Purl
pkg:composer/moodle/moodle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
3.5.0
Fixed
3.5.4

Affected versions

v3.*

v3.5.0
v3.5.1
v3.5.2
v3.5.3