Miggo Logo

CVE-2020-25700:
SQL Injection in moodle

6.5

CVSS Score

Basic Information

EPSS Score
-
Published
3/29/2021
Updated
9/12/2023
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 3.9.0, < 3.9.33.9.3
moodle/moodlecomposer>= 3.8.0, < 3.8.63.8.6
moodle/moodlecomposer>= 3.7.0, < 3.7.93.7.9
moodle/moodlecomposer>= 3.5.0, < 3.5.153.5.15

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The commit diff shows critical fixes in both functions:- 1) In get_data_access_information, groupmode calculation was moved outside conditional blocks to ensure consistent group validation. 2) In add_entry, redundant groupmode calls were eliminated to prevent context mismatch. The accompanying test cases (test_get_data_access_information_groups and test_add_entry_invalid_group) explicitly validate that these functions now properly enforce group permissions, confirming they were the vulnerability sources. The CWE-89 mapping aligns with improper SQL query scoping due to missing group validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

In moo*l*, som* **t***s* mo*ul* w** s*rvi**s *llow** stu**nts to *** *ntri*s wit*in *roups t**y *i* not **lon* to. V*rsions *****t**: *.* to *.*.*, *.* to *.*.*, *.* to *.*.*, *.* to *.*.** *n* **rli*r unsupport** v*rsions. T*is is *ix** in moo*l* *.

Reasoning

T** *ommit *i** s*ows *riti**l *ix*s in *ot* *un*tions:- *) In **t_**t*_****ss_in*orm*tion, *roupmo** **l*ul*tion w*s mov** outsi** *on*ition*l *lo*ks to *nsur* *onsist*nt *roup v*li**tion. *) In ***_*ntry, r**un**nt *roupmo** **lls w*r* *limin*t** t