First published: Tue Jul 12 2022(Updated: )
Insufficient path checks in a lesson question import resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default. Versions affected: 4.0 to 4.0.1, 3.11 to 3.11.7, 3.9 to 3.9.14 and earlier unsupported versions Versions fixed: 4.0.2, 3.11.8 and 3.9.15
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | >=3.9.0<3.9.15 | |
Moodle Moodle | >=3.11.0<3.11.8 | |
Moodle Moodle | >=4.0.0<4.0.2 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/moodle | <4.0.2 | 4.0.2 |
redhat/moodle | <3.11.8 | 3.11.8 |
redhat/moodle | <3.9.15 | 3.9.15 |
composer/moodle/moodle | >=4.0<4.0.2 | 4.0.2 |
composer/moodle/moodle | >=3.11<3.11.8 | 3.11.8 |
composer/moodle/moodle | >=3.9<3.9.15 | 3.9.15 |
>=3.9.0<3.9.15 | ||
>=3.11.0<3.11.8 | ||
>=4.0.0<4.0.2 | ||
=35 | ||
=36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35650 is a vulnerability found in Moodle that occurs due to input validation error when importing lesson questions.
The severity of CVE-2022-35650 is high with a CVSS score of 7.5.
CVE-2022-35650 allows a remote attacker to perform directory traversal attacks by exploiting a path traversal vulnerability in Moodle.
Versions 3.9.0 to 3.9.15, 3.11.0 to 3.11.8, and 4.0.0 to 4.0.2 of Moodle are affected by CVE-2022-35650.
To fix the CVE-2022-35650 vulnerability in Moodle, you should update to version 3.9.15, 3.11.8, or 4.0.2.