Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 01:54
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://packetstormsecurity.com/files/164479/Moodle-Authenticated-Spelling-Binary-Remote-Code-Execution.html - | |
| References | () https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one - | |
| References | () https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats - Exploit | 
12 Oct 2021, 18:15
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
 | 
Information
                Published : 2013-11-01 02:55
Updated : 2025-04-11 00:51
NVD link : CVE-2013-3630
Mitre link : CVE-2013-3630
CVE.ORG link : CVE-2013-3630
JSON object : View
Products Affected
                moodle
- moodle
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
