Miggo Logo

CVE-2024-43435: Moodle has insufficient capability checks

5.3

CVSS Score
3.1

Basic Information

EPSS Score
0.40545%
Published
11/11/2024
Updated
11/12/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 4.4.0, < 4.4.24.4.2
moodle/moodlecomposer>= 4.3.0, < 4.3.64.3.6
moodle/moodlecomposer>= 4.2.0, < 4.2.94.2.9
moodle/moodlecomposer< 4.1.124.1.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from missing capability checks during glossary restoration. The commit MDL-64984 specifically addresses adding a capability check in mod_glossary's restore logic. The restore_glossary_activity_task::execute function is responsible for restoration setup, and prior to the fix, it didn't validate if the user had global glossary management permissions. This matches the CVE description of insufficient checks allowing unauthorized global glossary restorations. The file path and function are derived from standard Moodle module structure and the commit's context.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w w*s *oun* in moo*l*. Insu**i*i*nt **p**ility ****ks m*k* it possi*l* *or us*rs wit* ****ss to r*stor* *loss*ri*s in *ours*s to r*stor* t**m into t** *lo**l sit* *loss*ry.

Reasoning

T** vuln*r**ility st*ms *rom missin* **p**ility ****ks *urin* *loss*ry r*stor*tion. T** *ommit M*L-***** sp**i*i**lly ***r*ss*s ***in* * **p**ility ****k in mo*_*loss*ry's r*stor* lo*i*. T** r*stor*_*loss*ry_**tivity_t*sk::*x**ut* *un*tion is r*spons