Miggo Logo

CVE-2018-1081:
Moodle Unauthenticated users can trigger custom messages to admin via paypal enrol script

5.3

CVSS Score

Basic Information

EPSS Score
-
Published
5/13/2022
Updated
4/23/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 3.1, < 3.1.113.1.11
moodle/moodlecomposer>= 3.2, < 3.2.83.2.8
moodle/moodlecomposer>= 3.3, < 3.3.53.3.5
moodle/moodlecomposer>= 3.4, < 3.4.23.4.2

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from the PayPal enrollment IPN handler sending error notifications before validating the request's origin. While no specific function name is explicitly mentioned in available resources, the core issue resides in the IPN processing logic within enrol/paypal/ipn.php. The fix (referenced via MDL-61392) would have moved email notifications after PayPal verification checks. The high confidence comes from: 1) The CVE description explicitly mentioning the PayPal enrol script as the vector, 2) Standard Moodle architecture placing IPN handling in this file, and 3) The nature of the vulnerability requiring email-sending logic before validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in Moo*l* *.* to *.*.*, *.* to *.*.*, *.* to *.*.*, *.* to *.*.** *n* **rli*r unsupport** v*rsions. Un*ut**nti**t** us*rs **n tri***r *ustom m*ss***s to **min vi* p*yp*l *nrol s*ript. P*yp*l IPN **ll***k s*ript s*oul* only s*n* *rror

Reasoning

T** vuln*r**ility st*ms *rom t** P*yP*l *nrollm*nt IPN **n*l*r s*n*in* *rror noti*i**tions ***or* v*li**tin* t** r*qu*st's ori*in. W*il* no sp**i*i* *un*tion n*m* is *xpli*itly m*ntion** in *v*il**l* r*sour**s, t** *or* issu* r*si**s in t** IPN pro**