Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2023-30943 — External Control of File Name or Path in Moodle
Severity
5.3MEDIUMNVD
CNA6.5
EPSS
17.1%
top 5.00%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 2
Description
The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages3 packages
Also affects: Fedora 36, 37, 38
Patches
🔴Vulnerability Details
4OSV▶
CVE-2023-30943: The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders↗2023-05-02
💥Exploits & PoCs
1Nuclei▶
Moodle - Cross-Site Scripting/Remote Code Execution