First published: Mon Nov 11 2024(Updated: )
A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | <4.1.12 | 4.1.12 |
composer/moodle/moodle | >=4.2.0<4.2.9 | 4.2.9 |
composer/moodle/moodle | >=4.3.0<4.3.6 | 4.3.6 |
composer/moodle/moodle | >=4.4.0<4.4.2 | 4.4.2 |
Moodle | <4.1.12 | |
Moodle | >=4.2.0<4.2.9 | |
Moodle | >=4.3.0<4.3.6 | |
Moodle | >=4.4.0<4.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43432 is classified as a medium severity vulnerability.
To fix CVE-2024-43432, upgrade your Moodle installation to version 4.1.12, 4.2.9, 4.3.6, or 4.4.2.
CVE-2024-43432 affects the cURL wrapper in Moodle by potentially leaking HTTP authorization data.
The implications of CVE-2024-43432 include the accidental exposure of sensitive HTTP authorization headers to redirect URLs.
CVE-2024-43432 impacts Moodle versions prior to 4.1.12, 4.2.9, 4.3.6, and 4.4.2.