First published: Wed Oct 11 2023(Updated: )
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | <4.3.0-rc2 | 4.3.0-rc2 |
Moodle Moodle | <3.9.24 | |
Moodle Moodle | >=3.11.0<3.11.17 | |
Moodle Moodle | >=4.0.0<4.0.11 | |
Moodle Moodle | >=4.1.0<4.1.6 | |
Moodle Moodle | >=4.2.0<4.2.3 | |
Fedoraproject Extra Packages For Enterprise Linux | =7.0 | |
Fedoraproject Fedora | =38 | |
redhat/moodle | <4.2.3 | 4.2.3 |
redhat/moodle | <4.1.6 | 4.1.6 |
redhat/moodle | <4.0.11 | 4.0.11 |
redhat/moodle | <3.11.17 | 3.11.17 |
redhat/moodle | <3.9.24 | 3.9.24 |
<3.9.24 | ||
>=3.11.0<3.11.17 | ||
>=4.0.0<4.0.11 | ||
>=4.1.0<4.1.6 | ||
>=4.2.0<4.2.3 | ||
=7.0 | ||
=38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-5539 is a vulnerability that allows authenticated remote code execution in the Lesson activity in Moodle.
CVE-2023-5539 has a severity rating of 8.8 (high).
Moodle versions up to and including 4.2.3 are affected by CVE-2023-5539.
To fix CVE-2023-5539, you should update Moodle to version 4.2.3 or apply the relevant security patch.
You can find more information about CVE-2023-5539 in the references provided: [http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408](http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408), [https://bugzilla.redhat.com/show_bug.cgi?id=2243352](https://bugzilla.redhat.com/show_bug.cgi?id=2243352), [https://moodle.org/mod/forum/discuss.php?d=451580](https://moodle.org/mod/forum/discuss.php?d=451580).