Miggo Logo

CVE-2014-7846: Moodle does not consider the moodle/tag:edit capability before adding a tag

4

CVSS Score

Basic Information

EPSS Score
0.47528%
CWE
-
Published
5/13/2022
Updated
1/24/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
AV:N/AC:L/Au:S/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer< 2.5.92.5.9
moodle/moodlecomposer>= 2.6.0, < 2.6.62.6.6
moodle/moodlecomposer>= 2.7.0, < 2.7.32.7.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the lack of a capability check in tag_autocomplete.php. The original code only checked general authentication (require_login) but omitted require_capability('moodle/tag:edit'), allowing unauthorized tag additions. The commit diff shows the addition of this capability check and other security hardening (e.g., input validation via PARAM_TAG). The primary vulnerable code path is the procedural flow in tag_autocomplete.php, which handled the AJAX request without proper authorization. No specific named functions are directly vulnerable, but the script's entry point is the critical point of failure.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

t**/t**_*uto*ompl*t*.p*p in Moo*l* t*rou** *.*.**, *.*.x ***or* *.*.*, *.*.x ***or* *.*.*, *n* *.*.x ***or* *.*.* *o*s not *onsi**r t** moo*l*/t**:**it **p**ility ***or* ***in* * t**, w*i** *llows r*mot* *ut**nti**t** us*rs to *yp*ss int*n*** ****ss

Reasoning

T** vuln*r**ility st*ms *rom t** l**k o* * **p**ility ****k in t**_*uto*ompl*t*.p*p. T** ori*in*l *o** only ****k** **n*r*l *ut**nti**tion (r*quir*_lo*in) *ut omitt** r*quir*_**p**ility('moo*l*/t**:**it'), *llowin* un*ut*oriz** t** ***itions. T** *om
CVE-2014-7846: Moodle Tag Edit Auth Bypass | Miggo