CVE-2024-48901

4.3 MEDIUM

📋 TL;DR

This CVE describes an improper authorization vulnerability in Moodle where users can access report schedules without proper edit permissions. This affects Moodle instances where users have report viewing capabilities but should not be able to schedule reports. The vulnerability allows unauthorized access to scheduling functionality.

💻 Affected Systems

Products:
  • Moodle
Versions: Specific versions not detailed in provided reference; check Moodle security advisories for exact affected versions
Operating Systems: All platforms running Moodle
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Moodle instances with report scheduling functionality enabled. The vulnerability exists in authorization checks for report schedule access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users could schedule reports they shouldn't have access to, potentially exposing sensitive data or causing resource exhaustion through excessive report generation.

🟠

Likely Case

Users with limited report access could schedule reports they're not authorized to edit, potentially accessing data beyond their intended permissions.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to minor information disclosure or configuration changes.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to Moodle. Attack complexity is low as it involves accessing specific report scheduling functionality without proper authorization checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Moodle security releases for specific patched version

Vendor Advisory: https://moodle.org/security/

Restart Required: No

Instructions:

1. Check Moodle security advisories for affected versions
2. Update to the latest patched version of Moodle
3. Apply the security patch if available for your version
4. Verify authorization checks for report scheduling are functioning correctly

🔧 Temporary Workarounds

Disable report scheduling

all

Temporarily disable report scheduling functionality until patched

Navigate to Moodle admin panel > Reports > Schedules > Disable scheduling

Restrict report access

all

Review and tighten report access permissions for all users

Review user roles and capabilities in Moodle admin panel

🧯 If You Can't Patch

  • Implement strict access controls and monitoring for report scheduling activities
  • Regularly audit user permissions and report access logs for unauthorized scheduling attempts

🔍 How to Verify

Check if Vulnerable:

Test if users without edit permissions can access report scheduling functionality. Check Moodle version against security advisories.

Check Version:

Check Moodle version in Site administration > Notifications or via moodle_version table in database

Verify Fix Applied:

Verify that users without proper edit permissions cannot access report scheduling. Confirm Moodle version is updated to patched release.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to report scheduling pages
  • Report schedule creation/modification by users without edit permissions

Network Indicators:

  • HTTP requests to report scheduling endpoints from unauthorized users

SIEM Query:

source="moodle_logs" AND (event="report_schedule_access" OR event="unauthorized_access") AND user_role!="editor"

🔗 References

📤 Share & Export