Moodle allows attackers to trigger the generation of arbitrary messages
Moderate severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Jan 25, 2024
Package
Affected versions
< 2.5.9
>= 2.6.0, < 2.6.6
>= 2.7.0, < 2.7.3
Patched versions
2.5.9
2.6.6
2.7.3
Description
Published by the National Vulnerability Database
Nov 24, 2014
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jan 25, 2024
Last updated
Jan 25, 2024
The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
References