Miggo Logo

CVE-2021-20187: Moodle Arbitrary PHP code execution by site admins via Shibboleth configuration

7.2

CVSS Score
3.1

Basic Information

EPSS Score
0.63371%
Published
5/24/2022
Updated
4/23/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 3.5, < 3.5.163.5.16
moodle/moodlecomposer>= 3.8, < 3.8.73.8.7
moodle/moodlecomposer>= 3.9, < 3.9.43.9.4
moodle/moodlecomposer>= 3.10, < 3.10.13.10.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The analysis is based on understanding the vulnerability description and the context provided by the Moodle security advisory and GitHub Advisory Database. The exact functions are inferred based on the typical handling of Shibboleth authentication and potential code injection vulnerabilities.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

It w*s *oun* in Moo*l* ***or* v*rsion *.**.*, *.*.*, *.*.* *n* *.*.** t**t it w*s possi*l* *or sit* **ministr*tors to *x**ut* *r*itr*ry P*P s*ripts vi* * P*P in*lu** us** *urin* S*i**ol*t* *ut**nti**tion.

Reasoning

T** *n*lysis is **s** on un**rst*n*in* t** vuln*r**ility **s*ription *n* t** *ont*xt provi*** *y t** Moo*l* s**urity **visory *n* *it*u* **visory **t***s*. T** *x**t *un*tions *r* in**rr** **s** on t** typi**l **n*lin* o* S*i**ol*t* *ut**nti**tion *n