CVE-2023-30944: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- bugzilla.redhat.com/show_bug.cgi?id=2188606
- github.com/advisories/GHSA-7mmc-22g7-3xq2
- github.com/moodle/moodle/commit/5521d1d6e8bb8bebb76ad8154095f6b18ea26e7f
- moodle.org/mod/forum/discuss.php?d=446286
- nvd.nist.gov/vuln/detail/CVE-2023-30944
Detect and mitigate CVE-2023-30944 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →