{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2023-30944","assignerOrgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","assignerShortName":"fedora","dateUpdated":"2024-08-02T14:37:15.570Z","dateReserved":"2023-04-21T00:00:00.000Z","datePublished":"2023-05-02T00:00:00.000Z"},"containers":{"cna":{"title":"Moodle: minor sql injection risk in external wiki method for listing pages","metrics":[{"other":{"content":{"value":"Low","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":5.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database."}],"affected":[{"versions":[{"status":"affected","version":"4.1.0","lessThan":"4.1.3","versionType":"semver"},{"status":"affected","version":"4.0.0","lessThan":"4.0.8","versionType":"semver"},{"status":"affected","version":"3.11.0","lessThan":"3.11.14","versionType":"semver"},{"status":"affected","version":"0","lessThan":"3.9.21","versionType":"semver"}],"packageName":"moodle","collectionURL":"https://git.moodle.org","defaultStatus":"unaffected"}],"references":[{"url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188606"},{"name":"FEDORA-2023-0ab503de3d","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/"},{"name":"FEDORA-2023-60a90b6e6a","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/"},{"name":"FEDORA-2023-49eb814ccc","tags":["vendor-advisory"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/"},{"url":"https://moodle.org/mod/forum/discuss.php?d=446286"}],"datePublic":"2023-05-01T04:00:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","timeline":[{"lang":"en","time":"2023-04-21T00:00:00.000Z","value":"Reported to Red Hat."},{"lang":"en","time":"2023-05-01T04:00:00.000Z","value":"Made public."}],"credits":[{"lang":"en","value":"Upstream acknowledges Paul Holden as the original reporter."}],"providerMetadata":{"orgId":"92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5","shortName":"fedora","dateUpdated":"2024-04-19T13:40:22.743Z"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-30944","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-05-28T19:37:42.641686Z"}}}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:19:52.823Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:37:15.570Z"},"title":"CVE Program Container","references":[{"url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187","tags":["x_transferred"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2188606","tags":["x_transferred"]},{"name":"FEDORA-2023-0ab503de3d","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/54TM5H5PDUDYXOQ7X7PPYWP4AJDAE73I/"},{"name":"FEDORA-2023-60a90b6e6a","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZBWRVUJF7HI53XCJPJ3YJZPOV5HBRUY/"},{"name":"FEDORA-2023-49eb814ccc","tags":["vendor-advisory","x_transferred"],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PBFSXRYLT4ICKJVQSRBAOUDMDRVSVBLS/"},{"url":"https://moodle.org/mod/forum/discuss.php?d=446286","tags":["x_transferred"]}]}]}}