Skip to content

PHP Spellchecker addon for TinyMCE allows attackers to trigger arbitrary outbound HTTP requests

Moderate severity GitHub Reviewed Published May 13, 2022 to the GitHub Advisory Database • Updated Jan 25, 2024

Package

composer moodle/moodle (Composer)

Affected versions

>= 2.1.0, < 2.1.10
>= 2.2.0, < 2.2.7
>= 2.3.0, < 2.3.4
= 2.4.0

Patched versions

2.1.10
2.2.7
2.3.4
2.4.1

Description

classes/GoogleSpell.php in the PHP Spellchecker (aka Google Spellchecker) addon before 2.0.6.1 for TinyMCE, as used in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 and other products, does not properly handle control characters, which allows remote attackers to trigger arbitrary outbound HTTP requests via a crafted string.

References

Published by the National Vulnerability Database Jan 27, 2013
Published to the GitHub Advisory Database May 13, 2022
Reviewed Jan 25, 2024
Last updated Jan 25, 2024

Severity

Moderate

EPSS score

0.643%
(80th percentile)

Weaknesses

No CWEs

CVE ID

CVE-2012-6112

GHSA ID

GHSA-fx5h-3786-h2w6

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.