CVE-2021-32474

Source
https://cve.org/CVERecord?id=CVE-2021-32474
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32474.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-32474
Aliases
Downstream
Published
2022-03-11T18:15:15.610Z
Modified
2026-03-13T04:54:58.407775Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An SQL injection risk existed on sites with MNet enabled and configured, via an XML-RPC call from the connected peer host. Note that this required site administrator access or access to the keypair. Moodle 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8, 3.5 to 3.5.17 and earlier unsupported versions are affected.

References

Affected packages

Git / github.com/moodle/moodle

Affected ranges

Type
GIT
Repo
https://github.com/moodle/moodle
Events
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "3.5.18"
        },
        {
            "introduced": "3.8.0"
        },
        {
            "fixed": "3.8.9"
        },
        {
            "introduced": "3.9.0"
        },
        {
            "fixed": "3.9.7"
        },
        {
            "introduced": "3.10.0"
        },
        {
            "fixed": "3.10.4"
        }
    ]
}

Affected versions

v3.*
v3.10.0
v3.10.0-beta
v3.10.0-rc1
v3.10.0-rc2
v3.10.1
v3.10.2
v3.10.3
v3.8.0
v3.8.1
v3.8.2
v3.8.3
v3.8.4
v3.8.5
v3.8.6
v3.8.7
v3.8.8
v3.9.0
v3.9.0-beta
v3.9.0-rc1
v3.9.0-rc2
v3.9.0-rc3
v3.9.1
v3.9.2
v3.9.3
v3.9.4
v3.9.5
v3.9.6

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-32474.json"