The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
{
"unresolved_ranges": [
{
"extracted_events": [
{
"last_affected": "7.0"
}
],
"cpe": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "36"
}
],
"cpe": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "37"
}
],
"cpe": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
},
{
"extracted_events": [
{
"last_affected": "38"
}
],
"cpe": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}
]
}{
"extracted_events": [
{
"introduced": "3.9.0"
},
{
"fixed": "3.9.21"
},
{
"introduced": "3.11.0"
},
{
"fixed": "3.11.14"
},
{
"introduced": "4.0.0"
},
{
"fixed": "4.0.8"
},
{
"introduced": "4.1.0"
},
{
"fixed": "4.1.3"
}
],
"cpe": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"source": "CPE_FIELD"
}