Scans for Moodle Learning Platform Following Recent Update, (Wed, Sep 4th)

SANS Internet Storm Center, InfoCON: green 2024-09-04

Summary:

On August 10th, the popular learning platform "Moodle" released an update fixing &#x25&#x3b;&#x25&#x3b;cve:2024-43425&#x25&#x3b;&#x25&#x3b;. RedTeam Pentesting found the vulnerability and published a detailed blog post late last week. The blog post demonstrates in detail how a user with the "trainer" role could execute arbitrary code on the server. A trainer would have to publish a "calculated question". These questions are generated dynamically by evaluating a formula. Sadly, the formula was evaluated using PHP&#39&#x3b;s "eval" command. As pointed out by RedTeam Pentesting, "eval" is a very dangerous command to use and should be avoided if at all possible. This applies not only to PHP but to most languages (also see my video about command injection vulnerabilities). As I usually say: "eval is only one letter away from evil".

Link:

https://isc.sans.edu/diary/rss/31230

From feeds:

Intel Hub ยป T01 - SANS Internet Storm Center, InfoCON: green

Tags:

Date tagged:

09/04/2024, 12:17

Date published:

09/04/2024, 10:37