CVE-2023-35133

An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:4.2.0:*:*:*:*:*:*:*

History

21 Nov 2024, 08:08

Type Values Removed Values Added
References () https://bugzilla.redhat.com/show_bug.cgi?id=2214373 - () https://bugzilla.redhat.com/show_bug.cgi?id=2214373 -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/ -
References () https://moodle.org/mod/forum/discuss.php?d=447831 - Patch, Vendor Advisory () https://moodle.org/mod/forum/discuss.php?d=447831 - Patch, Vendor Advisory

19 Apr 2024, 14:15

Type Values Removed Values Added
References
  • () https://bugzilla.redhat.com/show_bug.cgi?id=2214373 -

07 Nov 2023, 04:15

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/', 'name': 'FEDORA-2023-ce24b63b36', 'tags': [], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/', 'name': 'FEDORA-2023-3ca351353f', 'tags': [], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/ -

30 Jun 2023, 03:15

Type Values Removed Values Added
References
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I5QAEAGJ44NVXLAJFJXKARKC45OGEDXT/ -
  • (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7A72KX4WU6GK2CX4TKYFGFASPKOEOJFC/ -

29 Jun 2023, 20:27

Type Values Removed Values Added
CPE cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:4.2.0:*:*:*:*:*:*:*
References (MISC) https://moodle.org/mod/forum/discuss.php?d=447831 - (MISC) https://moodle.org/mod/forum/discuss.php?d=447831 - Patch, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CWE CWE-918
First Time Moodle
Moodle moodle

22 Jun 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-22 21:15

Updated : 2024-11-21 08:08


NVD link : CVE-2023-35133

Mitre link : CVE-2023-35133

CVE.ORG link : CVE-2023-35133


JSON object : View

Products Affected

moodle

  • moodle
CWE
CWE-918

Server-Side Request Forgery (SSRF)