CVE-2023-5548

Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

21 Nov 2024, 08:41

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-09 20:15

Updated : 2024-11-21 08:41


NVD link : CVE-2023-5548

Mitre link : CVE-2023-5548

CVE.ORG link : CVE-2023-5548


JSON object : View

Products Affected

moodle

  • moodle

fedoraproject

  • fedora
  • extra_packages_for_enterprise_linux
CWE
CWE-349

Acceptance of Extraneous Untrusted Data With Trusted Data

CWE-345

Insufficient Verification of Data Authenticity