[webapps] TextPattern CMS 4.8.7 – Remote Command Execution (RCE) (Authenticated)
[local] SolarWinds Kiwi CatTools 3.11.8 – Unquoted Service Path
myfactory.FMS 7.1-911 Cross Site Scripting
myfactory.FMS versions 7.1-911 and below suffer from a cross site scripting vulnerability.
Moodle Authenticated Spelling Binary Remote Code Execution
Moodle allows an authenticated user to define spellcheck settings via the web interface. The user can update the spellcheck mechanism to point to a system-installed aspell binary. By updating the path for the spellchecker to an arbitrary command, an attacker can run arbitrary commands in the context of the web application upon spellchecking requests. This […]
Moodle Teacher Enrollment Privilege Escalation / Remote Code Execution
Moodle versions 3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12, and earlier unsupported versions allow for a teacher to exploit chain to remote code execution. A bug in the privileges system allows a teacher to add themselves as a manager to their own class. They can then add any other users, and thus […]
Moodle SpellChecker Path Authenticated Remote Command Execution
Moodle allows an authenticated administrator to define spellcheck settings via the web interface. An administrator can update the aspell path to include a command injection. This is extremely similar to CVE-2013-3630, just using a different variable. This Metasploit module was tested against Moodle versions 3.11.2, 3.10.0, and 3.8.0.
Moodle Admin Shell Upload
This Metasploit module will generate a plugin which can receive a malicious payload request and upload it to a server running Moodle provided valid admin credentials are used. Then the payload is sent for execution, and the plugin uninstalled. You must have an admin account to exploit this vulnerability. Successfully tested against versions 3.6.3, 3.8.0, […]