CVE-2013-3630
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
01/11/2013
Last modified:
11/04/2025
Description
Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* | 2.5.2 (including) | |
cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
- http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats