First published: Fri Apr 21 2023(Updated: )
Insufficient sanitizing of loaders used by TinyMCE resulted in an arbitrary folder creation risk. Versions affected: 4.1 to 4.1.2 Versions fixed: 4.1.3
Credit: patrick@puiterwijk.org patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | >=4.1.0<4.1.3 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =36 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
composer/moodle/moodle | <4.2.0-rc2 | 4.2.0-rc2 |
redhat/moodle | <4.1.3 | 4.1.3 |
>=4.1.0<4.1.3 | ||
=7.0 | ||
=36 | ||
=37 | ||
=38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Moodle vulnerability is CVE-2023-30943.
The severity of CVE-2023-30943 is medium with a severity value of 5.3.
CVE-2023-30943 affects Moodle by allowing a user to control the path of file creation in TinyMCE loaders.
A remote user can exploit CVE-2023-30943 by sending a specially crafted HTTP request to create arbitrary folders on the system.
The recommended remedy for CVE-2023-30943 is to update to Moodle version 4.1.3.