|
|||
Rule General Information |
---|
Release Date: | 2014-06-27 | |
Rule Name: | Moodle Remote Command Execution Vulnerability (CVE-2013-3630) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor. | |
Impact: | An attacker can execute arbitrary command via a successful exploit in the context of the vulnerable software. | |
Affected OS: | Windows, Other Unix, Linux | |
Reference: | https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats |
|
Solutions |
---|
The vendor has updated advisory in its official website. Please check it for more information. |