Arbitrary Code Execution Affecting moodle/moodle package, versions <3.9.17 >=3.11.0, <3.11.10 >=4.0.0, <4.0.4
Threat Intelligence
EPSS
0.85% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-MOODLEMOODLE-3038598
- published 2 Oct 2022
- disclosed 2 Oct 2022
- credit Paul Holden
Introduced: 2 Oct 2022
CVE-2022-40314 Open this link in a new tabHow to fix?
Upgrade moodle/moodle
to version 3.9.17, 3.11.10, 4.0.4 or higher.
Overview
moodle/moodle is a learning platform.
Affected versions of this package are vulnerable to Arbitrary Code Execution in the convert_configdata()
function in blocks/html/backup/moodle1/lib.php
, when loading a backup file from Moodle 1.9, due to unsafe deserialization.
References
CVSS Scores
version 3.1