Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-30943External Control of File Name or Path in Moodle

Severity
5.3MEDIUMNVD
CNA6.5
EPSS
17.1%
top 5.00%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMay 2

Description

The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages3 packages

NVDmoodle/moodle4.1.04.1.3
Packagistmoodle/moodle< 4.2.0-rc2

Also affects: Fedora 36, 37, 38

Patches

🔴Vulnerability Details

4
CVEList
Moodle: tinymce loaders susceptible to arbitrary folder creation2023-05-02
GHSA
Moodle External Control of File Name or Path vulnerability2023-05-02
OSV
CVE-2023-30943: The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders2023-05-02
OSV
Moodle External Control of File Name or Path vulnerability2023-05-02

💥Exploits & PoCs

1
Nuclei
Moodle - Cross-Site Scripting/Remote Code Execution