First published: Tue Nov 15 2022(Updated: )
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
Credit: bressers@elastic.co patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | <3.9.18 | |
Moodle Moodle | >=3.11.0<3.11.11 | |
Moodle Moodle | >=4.0.0<4.0.5 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
composer/moodle/moodle | >=4.0<4.0.5 | 4.0.5 |
composer/moodle/moodle | >=3.11<3.11.11 | 3.11.11 |
composer/moodle/moodle | >=3.9<3.9.18 | 3.9.18 |
redhat/moodle | <4.0.5 | 4.0.5 |
redhat/moodle | <3.11.11 | 3.11.11 |
redhat/moodle | <3.9.18 | 3.9.18 |
<3.9.18 | ||
>=3.11.0<3.11.11 | ||
>=4.0.0<4.0.5 | ||
=7.0 | ||
=35 | ||
=36 | ||
=37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45152 is a blind Server-Side Request Forgery (SSRF) vulnerability found in Moodle.
CVE-2022-45152 occurs due to insufficient validation of user-supplied input in Moodle's LTI provider library.
CVE-2022-45152 has a severity of 9.1 out of 10, which is critical.
Versions up to Moodle 3.9.18, Moodle 3.11.0 to 3.11.11, and Moodle 4.0.0 to 4.0.5 are affected by CVE-2022-45152.
To fix CVE-2022-45152, users should update to Moodle version 3.9.18, 3.11.11, or 4.0.5.