First published: Tue Feb 13 2024(Updated: )
MSA-24-0002: Forum search accepted random parameters in its URL Description: The URL parameters accepted by forum search were not limited to the allowed parameters. Issue summary: Forum search accepted random parameters in its URL Severity/Risk: Minor Versions affected: 4.3 to 4.3.2, 4.2 to 4.2.5, 4.1 to 4.1.8 and earlier unsupported versions Versions fixed: 4.3.3, 4.2.6 and 4.1.9 Reported by: Piotr Widak Issue no.: MDL-69774 CVE identifier: Pending Changes (master): <a href="http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69774">http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69774</a>
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/moodle | <4.3.3 | 4.3.3 |
redhat/4.2.6 and | <4.1.9 | 4.1.9 |
composer/moodle/moodle | <4.1.9 | 4.1.9 |
composer/moodle/moodle | >=4.2.0<4.2.6 | 4.2.6 |
composer/moodle/moodle | >=4.3.0<4.3.3 | 4.3.3 |
Moodle | >=4.1.0<4.1.9 | |
Moodle | >=4.2.0<4.2.6 | |
Moodle | >=4.3.0<4.3.3 | |
Fedora | =38 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-25979 is classified as minor.
To fix CVE-2024-25979, you should update your Moodle installation to a version beyond 4.3.3, specifically 4.3.3 or later.
CVE-2024-25979 affects Moodle versions from 4.1.0 up to 4.3.2.
No, CVE-2024-25979 pertains to unrestricted URL parameter acceptance rather than cross-site scripting.
While CVE-2024-25979 is considered minor, unrestricted URL parameters may potentially lead to unexpected behavior or information leakage.