module

Moodle SpellChecker Path Authenticated Remote Command Execution

Disclosed
Jun 22, 2021
Created
Oct 12, 2021

Description

Moodle allows an authenticated administrator to define spellcheck settings via the web interface.
An administrator can update the aspell path to include a command injection. This is extremely
similar to CVE-2013-3630, just using a different variable.

This module was tested against Moodle version 3.11.2, 3.10.0, and 3.8.0.

Authors

Adam Reiser
h00die

Platform

PHP

Architectures

php

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':


msf > use exploit/multi/http/moodle_spelling_path_rce
msf exploit(moodle_spelling_path_rce) > show targets
...targets...
msf exploit(moodle_spelling_path_rce) > set TARGET < target-id >
msf exploit(moodle_spelling_path_rce) > show options
...show and set options...
msf exploit(moodle_spelling_path_rce) > exploit

Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.