A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
2022-11-25T19:15:12.107
2025-04-29T15:15:52.930
Modified
CVSSv3.1: 9.1 (CRITICAL)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | moodle | moodle | < 3.9.18 | Yes |
Application | moodle | moodle | < 3.11.11 | Yes |
Application | moodle | moodle | < 4.0.5 | Yes |
Application | fedoraproject | extra_packages_for_enterprise_linux | 7.0 | Yes |
Operating System | fedoraproject | fedora | 35 | Yes |
Operating System | fedoraproject | fedora | 36 | Yes |
Operating System | fedoraproject | fedora | 37 | Yes |