cve/2024/CVE-2024-43425.md
2025-09-29 21:09:30 +02:00

30 lines
1.3 KiB
Markdown

### [CVE-2024-43425](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43425)
![](https://img.shields.io/static/v1?label=Product&message=null&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.3%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.4%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/LucianoHanna/rev_shell_detection
- https://github.com/PuddinCat/GithubRepoSpider
- https://github.com/RedTeamPentesting/moodle-rce-calculatedquestions
- https://github.com/Snizi/Moodle-CVE-2024-43425-Exploit
- https://github.com/aayush256-sys/Moodle-authenticated-RCE
- https://github.com/aninfosec/CVE-2024-43425-Poc
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/zulloper/cve-poc