Moodle 1.9.3 Remote Code Execution - Exploit-DB

2008

12 December 2008

Event

N/A

What

Vulnerability

vulnerability moodle rce remote-code-execution exploit-db security-research

On December 12, 2008, the international platform Exploit-DB published a technical advisory signed by the USH team, composed of Antonio “s4tan” Parata, Francesco “ascii” Ongaro, and Giovanni “evilaliv3” Pellerano, regarding a serious Remote Code Execution vulnerability in Moodle 1.9.3. The exploit, catalogued with ID 7437, showed how it was possible to execute arbitrary commands on the target server through the pathname parameter of the texed.php file. The advisory, originally distributed on the USH.it site and accompanied by proof of concept for Linux and Windows, credits Ongaro as co-author and reports his technical contacts. The document also specified that Moodle had chosen not to release an immediate corrective version, postponing the resolution to the next development branch.

Archived PDF document