Description
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-3532 | The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php. |
Github GHSA |
GHSA-c87j-9rrq-h3j8 | Moodle allows attackers to trigger the generation of arbitrary messages |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T13:33:13.411Z
Reserved: 2014-11-24T00:00:00.000Z
Link: CVE-2014-9060
No data.
Status : Modified
Published: 2014-11-24T11:59:15.137
Modified: 2026-05-06T22:30:45.220
Link: CVE-2014-9060
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA