Server-Side Request Forgery (SSRF) Affecting moodle/moodle package, versions <3.9.18 >=3.11, <3.11.11 >=4.0, <4.0.5


0.0
critical

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High

    Threat Intelligence

    EPSS 0.2% (59th percentile)
Expand this section
NVD
9.1 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-PHP-MOODLEMOODLE-6673227
  • published 24 Apr 2024
  • disclosed 25 Nov 2022
  • credit Rekter0, Holme

How to fix?

Upgrade moodle/moodle to version 3.9.18, 3.11.11, 4.0.5 or higher.

Overview

moodle/moodle is a learning platform.

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF) due to insufficient validation of user-supplied input in the LTI provider library. The library does not utilize Moodle's inbuilt cURL helper, which resulted in a risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.