Moodle の mod/lti/service.php における任意のファイルを読まれる脆弱性
| Title |
Moodle の mod/lti/service.php における任意のファイルを読まれる脆弱性
|
| Summary |
Moodle の mod/lti/service.php には、任意のファイルを読まれる脆弱性が存在します。 本件は、XML 外部エンティティ (XXE) の問題に関する脆弱性です。
|
| Possible impacts |
第三者により、エンティティ参照に関連する XML 外部エンティティ宣言を介して、任意のファイルを読まれる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
July 21, 2014, midnight |
| Registration Date |
July 30, 2014, 6:40 p.m. |
| Last Update |
July 30, 2014, 6:40 p.m. |
|
CVSS2.0 : 警告
|
| Score |
4.3
|
| Vector |
AV:N/AC:M/Au:N/C:P/I:N/A:N |
Affected System
| Moodle |
|
Moodle 2.3.11 まで
|
|
Moodle 2.4.11 未満の 2.4.x
|
|
Moodle 2.5.7 未満の 2.5.x
|
|
Moodle 2.6.4 未満の 2.6.x
|
|
Moodle 2.7.1 未満の 2.7.x
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2014年07月30日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2014-3542
| Summary |
mod/lti/service.php in Moodle through 2.3.11, 2.4.x before 2.4.11, 2.5.x before 2.5.7, 2.6.x before 2.6.4, and 2.7.x before 2.7.1 allows remote attackers to read arbitrary files via an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
| Publication Date |
July 29, 2014, 8:10 p.m. |
| Registration Date |
Jan. 26, 2021, 3:10 p.m. |
| Last Update |
Nov. 21, 2024, 11:08 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:moodle:moodle:2.7.0:*:*:*:*:*:*:* |
|
|
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.6.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:* |
|
|
|
|
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* |
|
2.3.11 |
|
|
| cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:* |
|
|
|
|
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.9:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.10:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:* |
|
|
|
|
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.5.6:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:* |
|
|
|
|
| cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List