{"containers":{"cna":{"affected":[{"product":"Moodle","vendor":"n/a","versions":[{"status":"affected","version":"Fixed in moodle 4.0.2, moodle 3.11.8, moodle 3.9.15"}]}],"descriptions":[{"lang":"en","value":"The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-22","description":"CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2022-07-27T04:06:14.000Z","orgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","shortName":"fedora"},"references":[{"tags":["x_refsource_MISC"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106274"},{"tags":["x_refsource_MISC"],"url":"https://moodle.org/mod/forum/discuss.php?d=436457"},{"tags":["x_refsource_MISC"],"url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029"},{"name":"FEDORA-2022-81ce74b2dd","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/"},{"name":"FEDORA-2022-7e7ce7df2e","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"patrick@puiterwijk.org","ID":"CVE-2022-35650","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Moodle","version":{"version_data":[{"version_value":"Fixed in moodle 4.0.2, moodle 3.11.8, moodle 3.9.15"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}]},"references":{"reference_data":[{"name":"https://bugzilla.redhat.com/show_bug.cgi?id=2106274","refsource":"MISC","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106274"},{"name":"https://moodle.org/mod/forum/discuss.php?d=436457","refsource":"MISC","url":"https://moodle.org/mod/forum/discuss.php?d=436457"},{"name":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029","refsource":"MISC","url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029"},{"name":"FEDORA-2022-81ce74b2dd","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/"},{"name":"FEDORA-2022-7e7ce7df2e","refsource":"FEDORA","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T09:36:44.416Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2106274"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://moodle.org/mod/forum/discuss.php?d=436457"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029"},{"name":"FEDORA-2022-81ce74b2dd","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/"},{"name":"FEDORA-2022-7e7ce7df2e","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/"}]}]},"cveMetadata":{"assignerOrgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","assignerShortName":"fedora","cveId":"CVE-2022-35650","datePublished":"2022-07-25T15:29:06.000Z","dateReserved":"2022-07-12T00:00:00.000Z","dateUpdated":"2024-08-03T09:36:44.416Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}