Miggo Logo

CVE-2011-4582:
Moodle Open Redirect in Calendar Set Page

4.9

CVSS Score

Basic Information

EPSS Score
0.37811%
Published
5/13/2022
Updated
1/17/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:M/Au:S/C:P/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 2.1, < 2.1.32.1.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from improper handling of the 'return' URL parameter across multiple calendar components. The pre-patch code directly embedded user-supplied 'return' values into redirect URLs without encoding or validation. Functions like calendar_filter_controls and filter_selection_table constructed URLs using moodle_url with raw 'return' parameters, allowing attackers to craft malicious redirects. The patch introduced base64 encoding/decoding and sesskey validation, confirming the original implementation lacked these critical security measures. The affected functions all participated in the vulnerable redirect chain by passing unvalidated URLs.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Op*n r**ir**t vuln*r**ility in t** **l*n**r s*t p*** in Moo*l* *.*.x ***or* *.*.* *llows r*mot* *ut**nti**t** us*rs to r**ir**t us*rs to *r*itr*ry w** sit*s *n* *on*u*t p*is*in* *tt**ks vi* * r**ir**tion URL.

Reasoning

T** vuln*r**ility st*ms *rom improp*r **n*lin* o* t** 'r*turn' URL p*r*m*t*r **ross multipl* **l*n**r *ompon*nts. T** pr*-p*t** *o** *ir**tly *m****** us*r-suppli** 'r*turn' v*lu*s into r**ir**t URLs wit*out *n*o*in* or v*li**tion. *un*tions lik* **l