The LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not properly restrict the parameters used in a return URL, which allows remote attackers to trigger the generation of arbitrary messages via a modified URL, related to mod/lti/locallib.php and mod/lti/return.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47927 - Vendor Advisory | |
References | () http://openwall.com/lists/oss-security/2014/11/17/11 - | |
References | () http://www.securitytracker.com/id/1031215 - | |
References | () https://moodle.org/mod/forum/discuss.php?d=275165 - |
Information
Published : 2014-11-24 11:59
Updated : 2025-04-12 10:46
NVD link : CVE-2014-9060
Mitre link : CVE-2014-9060
CVE.ORG link : CVE-2014-9060
JSON object : View
Products Affected
moodle
- moodle
CWE
CWE-20
Improper Input Validation