CVE-2023-5550: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
In a shared hosting environment that has been misconfigured to allow access to other users’ content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72249
- bugzilla.redhat.com/show_bug.cgi?id=2243452
- github.com/advisories/GHSA-5cvx-cwpx-9rjh
- github.com/moodle/moodle/commit/77766f9c8af8fc8d861d7ac09ce4e1f6e72faca7
- moodle.org/mod/forum/discuss.php?d=451591
- nvd.nist.gov/vuln/detail/CVE-2023-5550
Detect and mitigate CVE-2023-5550 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →