CVE-2024-43434

8.1 HIGH

📋 TL;DR

This CSRF vulnerability in Moodle's Feedback module allows attackers to trick authenticated users into unknowingly sending bulk messages to non-respondents. Any Moodle instance with the Feedback module enabled is affected, potentially impacting all users with appropriate permissions.

💻 Affected Systems

Products:
  • Moodle
Versions: Moodle 4.3.x before 4.3.7, 4.2.x before 4.2.10, 4.1.x before 4.1.14, 4.0.x before 4.0.18, and 3.11.x before 3.11.21
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Feedback module enabled and user with appropriate permissions to access non-respondents report

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could send malicious bulk messages to all course participants, potentially spreading phishing links, malware, or inappropriate content while appearing to come from legitimate instructors.

🟠

Likely Case

Spam messages sent to course participants, potentially damaging institutional reputation and causing user confusion.

🟢

If Mitigated

With proper CSRF protections and user awareness, impact is limited to minor inconvenience if detected quickly.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user interaction but CSRF makes exploitation straightforward once malicious page is crafted

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Moodle 4.3.7, 4.2.10, 4.1.14, 4.0.18, 3.11.21

Vendor Advisory: https://moodle.org/mod/forum/discuss.php?d=461203

Restart Required: No

Instructions:

1. Backup your Moodle installation and database. 2. Download the patched version from moodle.org. 3. Replace affected files or perform complete upgrade. 4. Clear Moodle caches. 5. Verify functionality.

🔧 Temporary Workarounds

Disable Feedback Module

all

Temporarily disable the Feedback module if not essential

Navigate to Site administration > Plugins > Activity modules > Manage activities > Feedback > Eye icon to disable

Restrict Non-Respondents Report Access

all

Limit access to users who absolutely need this functionality

Adjust role permissions in Site administration > Users > Permissions > Define roles

🧯 If You Can't Patch

  • Implement additional CSRF protections at web application firewall level
  • Monitor for unusual bulk message sending activity and alert on anomalies

🔍 How to Verify

Check if Vulnerable:

Check Moodle version in Site administration > General > About Moodle. Compare against affected versions list.

Check Version:

Check Moodle admin panel or examine version.php file in Moodle root directory

Verify Fix Applied:

After patching, verify version is updated and test bulk message sending functionality with proper CSRF token validation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual bulk message sending patterns
  • Multiple messages sent in quick succession from single user sessions

Network Indicators:

  • POST requests to feedback/nonrespondents.php without proper referrer headers

SIEM Query:

Search for: event_source='moodle' AND event_name='message_sent' AND message_count>threshold AND session_duration<short_timeframe

🔗 References

📤 Share & Export