Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0870 | In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk. |
Github GHSA |
GHSA-4rmj-w58m-fvch | Moodle vulnerable to Server-Side Request Forgery |
| Link | Providers |
|---|---|
| https://moodle.org/mod/forum/discuss.php?d=424802 |
|
Wed, 05 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2025-03-05T15:49:42.195Z
Reserved: 2021-07-12T00:00:00.000Z
Link: CVE-2021-36396
Updated: 2024-08-04T00:54:51.476Z
Status : Modified
Published: 2023-03-06T21:15:10.577
Modified: 2025-03-05T16:15:35.433
Link: CVE-2021-36396
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA