CVE-2013-3630: Improper Control of Generation of Code ('Code Injection')
(updated )
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
References
- packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html
- community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one
- community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
- github.com/advisories/GHSA-wxqg-fg7v-mmc6
- nvd.nist.gov/vuln/detail/CVE-2013-3630
Detect and mitigate CVE-2013-3630 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →