Miggo Logo

CVE-2012-6112:
PHP Spellchecker addon for TinyMCE allows attackers to trigger arbitrary outbound HTTP requests

5

CVSS Score

Basic Information

EPSS Score
0.68482%
CWE
-
Published
5/13/2022
Updated
1/25/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:N/I:P/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 2.1.0, < 2.1.102.1.10
moodle/moodlecomposer>= 2.2.0, < 2.2.72.2.7
moodle/moodlecomposer>= 2.3.0, < 2.3.42.3.4
moodle/moodlecomposer= 2.4.02.4.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from insufficient input sanitization in the GoogleSpell::_getMatches method. The fix in commit 2291018 (mirrored in Moodle's patches) adds two critical sanitization steps: 1) $lang is filtered to only allow a-z and hyphens, 2) $str has control characters removed. Before this fix, attackers could exploit these parameters to inject malicious payloads (e.g., via CR/LF characters) into the HTTP request, enabling arbitrary outbound requests. The direct correlation between the vulnerability description, CWE-264 (access control), and the code changes confirms this function's role.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*l*ss*s/*oo*l*Sp*ll.p*p in t** P*P Sp*ll****k*r (*k* *oo*l* Sp*ll****k*r) ***on ***or* *.*.*.* *or TinyM**, *s us** in Moo*l* *.*.x ***or* *.*.**, *.*.x ***or* *.*.*, *.*.x ***or* *.*.*, *n* *.*.x ***or* *.*.* *n* ot**r pro*u*ts, *o*s not prop*rly **

Reasoning

T** vuln*r**ility st*ms *rom insu**i*i*nt input s*nitiz*tion in t** `*oo*l*Sp*ll::_**tM*t***s` m*t*o*. T** *ix in *ommit ******* (mirror** in Moo*l*'s p*t***s) ***s two *riti**l s*nitiz*tion st*ps: *) `$l*n*` is *ilt*r** to only *llow *-z *n* *yp**ns