First published: Fri May 31 2024(Updated: )
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | <4.1.10 | 4.1.10 |
composer/moodle/moodle | >=4.2.0<4.2.7 | 4.2.7 |
composer/moodle/moodle | >=4.3.0<4.3.4 | 4.3.4 |
Moodle | <4.1.10 | |
Moodle | >=4.2.0<4.2.7 | |
Moodle | >=4.3.0<4.3.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34004 is considered a high severity vulnerability due to its potential for local file inclusion in a misconfigured shared hosting environment.
To fix CVE-2024-34004, upgrade Moodle to version 4.1.10, 4.2.7, or 4.3.4, depending on your current version.
CVE-2024-34004 affects shared hosting environments that are misconfigured, allowing users to access content from other users.
An attacker exploiting CVE-2024-34004 can execute a local file include to access sensitive files or information on the server.
User authentication is not enough to protect against CVE-2024-34004 if the underlying server configuration is misconfigured.