CVE-2019-6970: Moodle SSRF Vulnerability
(updated )
The edit_blog.php script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and more.
This kind of vulnerability is then called “blind” because of no response available on Moodle web site, enforcing attacker to exploit it using a “time based” approach.
References
- cds.thalesgroup.com/en/tcs-cert/CVE-2019-6970
- excellium-services.com/cert-xlm-advisory/cve-2019-6970
- github.com/advisories/GHSA-vjxx-54vw-q59f
- github.com/moodle/moodle
- nvd.nist.gov/vuln/detail/CVE-2019-6970
- www.excellium-services.com/cert-xlm-advisory
- www.excellium-services.com/cert-xlm-advisory/cve-2019-6970
Code Behaviors & Features
Detect and mitigate CVE-2019-6970 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →