CVE-2015-3181: Moodle allows attackers to bypass file-management restrictions
(updated )
files/externallib.php in Moodle through 2.5.9, 2.6.x before 2.6.11, 2.7.x before 2.7.8, and 2.8.x before 2.8.6 does not consider the moodle/user:manageownfiles capability before approving a private-file upload, which allows remote authenticated users to bypass intended file-management restrictions by using web services to perform uploads after this capability has been revoked.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-49994
- openwall.com/lists/oss-security/2015/05/18/1
- github.com/advisories/GHSA-622h-cjgg-5mx6
- github.com/moodle/moodle/commit/350397da93c557f577e7d62e7fc3e233792ad171
- github.com/moodle/moodle/commit/4b6b64685affa66784fd238c1bbc1eb0651492a0
- github.com/moodle/moodle/commit/57d9a750e3da6708dba13513e9b05e84a895ad9f
- github.com/moodle/moodle/commit/8e8ee7530427a10e409386657484e9fd5effc438
- moodle.org/mod/forum/discuss.php?d=313688
- nvd.nist.gov/vuln/detail/CVE-2015-3181
- web.archive.org/web/20200228054133/http://www.securityfocus.com/bid/74728
- web.archive.org/web/20201030042703/http://www.securitytracker.com/id/1032358
Detect and mitigate CVE-2015-3181 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →