Bug 1025654 (CVE-2013-3630) - CVE-2013-3630 moodle: authenticated remote command execution
Summary: CVE-2013-3630 moodle: authenticated remote command execution
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2013-3630
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1025655 1025656
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-11-01 08:20 UTC by Ratul Gupta
Modified: 2021-10-11 22:57 UTC (History)
1 user (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-08-22 15:37:14 UTC
Embargoed:


Attachments (Terms of Use)

Description Ratul Gupta 2013-11-01 08:20:18 UTC
Common Vulnerabilities and Exposures assigned an identifier CVE-2013-3630 to the following vulnerability:

Name: CVE-2013-3630
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3630 [Open">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3630">Open URL]
Assigned: 20130521
Reference: https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one [Open">https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one">Open URL]
Reference: https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats [Open">https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats">Open URL]

Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.

Comment 1 Ratul Gupta 2013-11-01 08:21:21 UTC
Created moodle tracking bugs for this issue:

Affects: fedora-all [bug 1025655]
Affects: epel-all [bug 1025656]


Note You need to log in before you can comment on or make changes to this bug.