CVE-2011-4582:
Moodle Open Redirect in Calendar Set Page
4.9
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37811%
CWE
Published
5/13/2022
Updated
1/17/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:M/Au:S/C:P/I:P/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | >= 2.1, < 2.1.3 | 2.1.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper handling of the 'return' URL parameter across multiple calendar components. The pre-patch code directly embedded user-supplied 'return' values into redirect URLs without encoding or validation. Functions like calendar_filter_controls and filter_selection_table constructed URLs using moodle_url with raw 'return' parameters, allowing attackers to craft malicious redirects. The patch introduced base64 encoding/decoding and sesskey validation, confirming the original implementation lacked these critical security measures. The affected functions all participated in the vulnerable redirect chain by passing unvalidated URLs.