9.8
CVSSv3

CVE-2021-36393

Published: 06/03/2023 Updated: 13/03/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

moodle moodle

Vendor Advisories

Check Point Reference: CPAI-2021-2158 Date Published: 24 Apr 2024 Severity: Critical ...

Exploits

Moodle version 3101 suffers from a remote time-based SQL injection vulnerability ...

Github Repositories

Error-based blind SQL injection with bit-shifting approach for Moodle 3.10.4

CVE-2021-36393 Error-based blind SQL injection with bit-shifting approach for Moodle 3104 Allows an attacker to perform arbitrary database queries For example, you can steal: test answers from the database Modify the scriptjs file and run it on route /mod/quiz/attemptphp?attempt=&cmid= user password hashes: (SELECT password FROM mdl_user WHERE id = 2 LIM

This script demonstrates a time-based blind SQL injection on Moodle platforms, exploiting response delays to extract data.

CVE-2021-36393 Exploit Description This repository holds a Python-based exploit targeting CVE-2021-36393, a severe vulnerability found within Moodle's recent courses feature The flaw resides in the 'sort' parameter, enabling SQL injection attacks that can lead to unauthorized database access Rated 98 on the CVSS scale, exploiting this vulnerability requires mi