First published: Tue Jul 12 2022(Updated: )
An omitted execution parameter resulted in a remote code execution risk for sites running GhostScript versions older than 9.50. Versions affected: 4.0 to 4.0.1, 3.11 to 3.11.7, 3.9 to 3.9.14 and earlier unsupported versions Versions fixed: 4.0.2, 3.11.8 and 3.9.15
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | >=3.9.0<3.9.15 | |
Moodle Moodle | >=3.11.0<3.11.8 | |
Moodle Moodle | >=4.0.0<4.0.2 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/moodle | <4.0.2 | 4.0.2 |
redhat/moodle | <3.11.8 | 3.11.8 |
redhat/moodle | <3.9.15 | 3.9.15 |
composer/moodle/moodle | >=4.0<4.0.2 | 4.0.2 |
composer/moodle/moodle | >=3.11<3.11.8 | 3.11.8 |
composer/moodle/moodle | >=3.9<3.9.15 | 3.9.15 |
>=3.9.0<3.9.15 | ||
>=3.11.0<3.11.8 | ||
>=4.0.0<4.0.2 | ||
=35 | ||
=36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35649 is a vulnerability found in Moodle, which occurs due to improper input validation when parsing PostScript code.
CVE-2022-35649 poses a remote code execution risk for sites running GhostScript versions older than 9.50.
Moodle versions 3.9.0 to 3.9.15, 3.11.0 to 3.11.8, and 4.0.0 to 4.0.2 are affected by CVE-2022-35649.
CVE-2022-35649 has a severity rating of 9.8 (Critical).
To fix CVE-2022-35649 in Moodle, it is recommended to upgrade to Moodle versions 3.9.16, 3.11.9, or 4.0.3.