Metasploit modules that can be used to exploit Moodle products
-
Moodle SpellChecker Path Authenticated Remote Command Execution
Disclosure Date: 2021-06-22First seen: 2022-12-23exploit/multi/http/moodle_spelling_path_rceMoodle allows an authenticated administrator to define spellcheck settings via the web interface. An administrator can update the aspell path to include a command injection. This is extremely similar to CVE-2013-3630, just using a different variable. This module was tested against Moodle version 3.11.2, 3.10.0, and 3.8.0. Authors: - Adam Reiser - h00die -
Moodle Teacher Enrollment Privilege Escalation to RCE
Disclosure Date: 2020-07-20First seen: 2022-12-23exploit/multi/http/moodle_teacher_enrollment_priv_esc_to_rceMoodle version 3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12 and earlier unsupported versions allow for a teacher to exploit chain to RCE. A bug in the privileges system allows a teacher to add themselves as a manager to their own class. They can then add any other users, and thus look to add someone with manager privileges on the system (not just the class). After adding a system manager, a 'loginas' feature is used to access their account. Next the system is reconfigured to allow for all users to install an addon/plugin. Then a malicious theme is uploaded and creates an RCE. If all of that is a success, we revert permissions for managers to system default and remove our malicoius theme. Manual cleanup to remove students from the class is required. This module was tested against Moodle version 3.9 Authors: - HoangKien1020 - lanz - h00die -
Moodle Authenticated Spelling Binary RCE
Disclosure Date: 2013-10-30First seen: 2022-12-23exploit/multi/http/moodle_spelling_binary_rceMoodle allows an authenticated user to define spellcheck settings via the web interface. The user can update the spellcheck mechanism to point to a system-installed aspell binary. By updating the path for the spellchecker to an arbitrary command, an attacker can run arbitrary commands in the context of the web application upon spellchecking requests. This module also allows an attacker to leverage another privilege escalation vuln. Using the referenced XSS vuln, an unprivileged authenticated user can steal an admin sesskey and use this to escalate privileges to that of an admin, allowing the module to pop a shell as a previously unprivileged authenticated user. This module was tested against Moodle version 2.5.2 and 2.2.3. Authors: - Brandon Perry <bperry.volatile@gmail.com> -
Moodle Authenticated Spelling Binary RCE
Disclosure Date: 2013-10-30First seen: 2022-12-23exploit/multi/http/moodle_spelling_binary_rceMoodle allows an authenticated user to define spellcheck settings via the web interface. The user can update the spellcheck mechanism to point to a system-installed aspell binary. By updating the path for the spellchecker to an arbitrary command, an attacker can run arbitrary commands in the context of the web application upon spellchecking requests. This module also allows an attacker to leverage another privilege escalation vuln. Using the referenced XSS vuln, an unprivileged authenticated user can steal an admin sesskey and use this to escalate privileges to that of an admin, allowing the module to pop a shell as a previously unprivileged authenticated user. This module was tested against Moodle version 2.5.2 and 2.2.3. Authors: - Brandon Perry <bperry.volatile@gmail.com>
4 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details