mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-4602 mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by viewing an activity instance.
Github GHSA Github GHSA GHSA-mphj-h2fc-62x3 Moodle allows attackers to bypass the mod/lti:view capability requirement
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T13:03:27.260Z

Reserved: 2014-10-03T00:00:00

Link: CVE-2014-7832

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-11-24T11:59:02.600

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-7832

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses