{"id":"CVE-2022-45152","details":"A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.","aliases":["BIT-moodle-2022-45152","GHSA-xqcf-vgqc-pcmg"],"modified":"2026-04-10T04:52:23.801706Z","published":"2022-11-25T19:15:12.107Z","references":[{"type":"WEB","url":"https://moodle.org/mod/forum/discuss.php?d=440772"},{"type":"WEB","url":"http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2142775"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/moodle/moodle","events":[{"introduced":"0"},{"fixed":"f89a47eff86c2d9e27ca18959be23e4350765160"},{"introduced":"94f2d3fc4b974c5c7d500988c56b7ca15f58d7ec"},{"fixed":"becbdd847ddac6ebaf8c9327ba523e5db95bb64c"},{"introduced":"8b359ad7a63cf219110bca80552fe3d4ea2a635d"},{"fixed":"fdbcfa1b153ee8b3cf863044f7b28f8b3b7a9500"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.9.18"},{"introduced":"3.11.0"},{"fixed":"3.11.11"},{"introduced":"4.0.0"},{"fixed":"4.0.5"}]}}],"versions":["v1.0.0","v1.0.1","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.6","v1.0.7","v1.0.8","v1.0.9","v1.1.0","v1.1.1","v1.2.0","v1.2.1","v1.3.0","v2.0.0","v2.0.0-rc1","v2.0.0-rc2","v2.0.1","v2.1.0","v2.2.0","v2.2.0-beta","v2.2.0-rc1","v2.3.0","v2.3.0-beta","v2.3.0-rc1","v2.4.0","v2.4.0-beta","v2.4.0-rc1","v2.5.0","v2.5.0-beta","v2.5.0-rc1","v2.6.0","v2.6.0-beta","v2.6.0-rc1","v2.7.0","v2.7.0-beta","v2.7.0-rc1","v2.7.0-rc2","v2.8.0","v2.8.0-beta","v2.8.0-rc1","v2.8.0-rc2","v2.9.0","v2.9.0-beta","v2.9.0-rc1","v2.9.0-rc2","v3.0.0","v3.0.0-beta","v3.0.0-rc1","v3.0.0-rc2","v3.0.0-rc3","v3.0.0-rc4","v3.1.0","v3.1.0-beta","v3.1.0-rc1","v3.1.0-rc2","v3.11.0","v3.11.1","v3.11.10","v3.11.2","v3.11.3","v3.11.4","v3.11.5","v3.11.6","v3.11.7","v3.11.8","v3.11.9","v3.2.0","v3.2.0-beta","v3.2.0-rc1","v3.2.0-rc2","v3.2.0-rc3","v3.2.0-rc4","v3.2.0-rc5","v3.3.0","v3.3.0-beta","v3.3.0-rc1","v3.3.0-rc2","v3.3.0-rc3","v3.4.0","v3.4.0-beta","v3.4.0-rc1","v3.4.0-rc2","v3.4.0-rc3","v3.5.0","v3.5.0-beta","v3.5.0-rc1","v3.6.0","v3.6.0-beta","v3.6.0-rc1","v3.6.0-rc2","v3.6.0-rc3","v3.7.0","v3.7.0-beta","v3.7.0-rc1","v3.7.0-rc2","v3.8.0","v3.8.0-beta","v3.8.0-rc1","v3.9.0","v3.9.0-beta","v3.9.0-rc1","v3.9.0-rc2","v3.9.0-rc3","v3.9.1","v3.9.10","v3.9.11","v3.9.12","v3.9.13","v3.9.14","v3.9.15","v3.9.16","v3.9.17","v3.9.2","v3.9.3","v3.9.4","v3.9.5","v3.9.6","v3.9.7","v3.9.8","v3.9.9","v4.0.0","v4.0.1","v4.0.2","v4.0.3","v4.0.4"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"35"}]},{"events":[{"introduced":"0"},{"last_affected":"36"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-45152.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}