Server-side Request Forgery (SSRF) Affecting moodle/moodle package, versions >=3.9.0, <3.9.22>=3.11.0, <3.11.15>=4.0.0, <4.0.9>=4.1.0, <4.1.4>=4.2.0, <4.2.1


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (44th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-MOODLEMOODLE-5734230
  • published23 Jun 2023
  • disclosed23 Jun 2023
  • creditMateo Hanžek

Introduced: 23 Jun 2023

CVE-2023-35133  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade moodle/moodle to version 3.9.22, 3.11.15, 4.0.9, 4.1.4, 4.2.1 or higher.

Overview

moodle/moodle is a learning platform.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to an issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists.

CVSS Scores

version 3.1