5.3
CVSSv3

CVE-2023-30943

Published: 02/05/2023 Updated: 19/04/2024
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

moodle moodle

fedoraproject fedora 36

fedoraproject extra packages for enterprise linux 7.0

fedoraproject fedora 37

fedoraproject fedora 38

Github Repositories

A Python-based tool to detect the CVE-2023-30943 vulnerability in Moodle, which allows unauthorized folder creation via specially crafted requests in TinyMCE loaders.

CVE-2023-30943 Vulnerability Scanner This tool detects a vulnerability in Moodle as described in the NVD Description Moodle contains a vulnerability due to the way it handles TinyMCE loaders The application allows a user to dictate the folder creation path A remote attacker can exploit this by sending a crafted HTTP request, enabling arbitrary folder creation on the system

CVE-2023-30943 RCE PoC

CVE-2023-30943 Moodle Vulnerabilities Exploits This repository contains combined exploits for two vulnerabilities in Moodle, a widely used open-source learning management system (LMS) The exploits leverage the vulnerabilities to demonstrate Unauthenticated Arbitrary Folder Creation leading to Stored Cross-Site Scripting (XSS) and Self-XSS leading to Account Takeover Please no

CVE-2023-30943 (Moodle XSS)

CVE-2023-30943(Moodle self-xss) Отказ от ответственности Весь контент предоставлен "как есть", без каких-либо гарантий, явных или подразумеваемых Авторы не несут ответственности за какой-либо ущерб, прямой или косве