Description
An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1537 | An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected. |
Github GHSA |
GHSA-rvmc-8gmg-ggqr | Moodle Blind SQL injection possible via MNet authentication |
References
| Link | Providers |
|---|---|
| https://moodle.org/mod/forum/discuss.php?d=422308 |
|
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T23:17:29.565Z
Reserved: 2021-05-07T00:00:00.000Z
Link: CVE-2021-32474
No data.
Status : Modified
Published: 2022-03-11T18:15:15.610
Modified: 2024-11-21T06:07:06.553
Link: CVE-2021-32474
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA