The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-6451 | The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system. |
Github GHSA |
GHSA-xp2f-9mx3-3c6p | Moodle PostScript Code Injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: fedora
Published:
Updated: 2024-08-03T09:36:44.417Z
Reserved: 2022-07-12T00:00:00
Link: CVE-2022-35649
No data.
Status : Modified
Published: 2022-07-25T16:15:08.247
Modified: 2024-11-21T07:11:26.037
Link: CVE-2022-35649
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA