Moodle blind Server-Side Request Forgery (SSRF) vulnerability in LTI provider library
Critical severity
GitHub Reviewed
Published
Nov 25, 2022
to the GitHub Advisory Database
•
Updated Apr 23, 2024
Package
Affected versions
>= 3.9, < 3.9.18
>= 3.11, < 3.11.11
>= 4.0, < 4.0.5
Patched versions
3.9.18
3.11.11
4.0.5
Description
Published by the National Vulnerability Database
Nov 25, 2022
Published to the GitHub Advisory Database
Nov 25, 2022
Reviewed
Apr 23, 2024
Last updated
Apr 23, 2024
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
References