CVE-2015-0217: Moodle allows attackers to cause a denial of service
6.8
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.68223%
CWE
-
Published
5/13/2022
Updated
1/25/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
AV:N/AC:L/Au:S/C:N/I:N/A:C
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
moodle/moodle | composer | < 2.6.7 | 2.6.7 |
moodle/moodle | composer | >= 2.7.0, < 2.7.4 | 2.7.4 |
moodle/moodle | composer | >= 2.8.0, < 2.8.2 | 2.8.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the original implementation of the filter method in filter.php, which directly applied a complex regex to the entire input via preg_replace_callback. The regex's structure (with nested quantifiers and ambiguous anchors) made it susceptible to ReDoS when processing maliciously crafted <a> tags. The commit explicitly addresses this by introducing input splitting and size checks, confirming the function's role in the vulnerability.