First published: Tue Jul 29 2014(Updated: )
The Repositories component in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via serialized data associated with an add-on.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=2.7.0<2.7.1 | 2.7.1 |
composer/moodle/moodle | >=2.6.0<2.6.4 | 2.6.4 |
composer/moodle/moodle | >=2.5.0<2.5.7 | 2.5.7 |
composer/moodle/moodle | <2.4.11 | 2.4.11 |
Moodle | =2.4.0 | |
Moodle | =2.4.1 | |
Moodle | =2.4.2 | |
Moodle | =2.4.3 | |
Moodle | =2.4.4 | |
Moodle | =2.4.5 | |
Moodle | =2.4.6 | |
Moodle | =2.4.7 | |
Moodle | =2.4.8 | |
Moodle | =2.4.9 | |
Moodle | =2.4.10 | |
Moodle | =2.5.0 | |
Moodle | =2.5.1 | |
Moodle | =2.5.2 | |
Moodle | =2.5.3 | |
Moodle | =2.5.4 | |
Moodle | =2.5.5 | |
Moodle | =2.5.6 | |
Moodle | =2.7.0 | |
Moodle | <=2.3.11 | |
Moodle | =2.3.0 | |
Moodle | =2.3.1 | |
Moodle | =2.3.2 | |
Moodle | =2.3.3 | |
Moodle | =2.3.4 | |
Moodle | =2.3.5 | |
Moodle | =2.3.6 | |
Moodle | =2.3.7 | |
Moodle | =2.3.8 | |
Moodle | =2.3.9 | |
Moodle | =2.3.10 | |
Moodle | =2.6.0 | |
Moodle | =2.6.1 | |
Moodle | =2.6.2 | |
Moodle | =2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3541 is considered to be a critical vulnerability as it allows remote attackers to execute arbitrary code.
To fix CVE-2014-3541, upgrade Moodle to version 2.7.1, 2.6.4, 2.5.7, or 2.4.11, as these versions contain patches for the vulnerability.
CVE-2014-3541 affects Moodle versions 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1.
In CVE-2014-3541, PHP object injection attacks exploit the insecure handling of serialized data, allowing attackers to manipulate object states and execute unexpected code.
If CVE-2014-3541 is not addressed, attackers can remotely execute arbitrary code, potentially gaining unauthorized access to sensitive data and compromising server integrity.