Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-36394 PoC — Moodle 代码注入漏洞

Source
Associated Vulnerability
Title:Moodle 代码注入漏洞 (CVE-2021-36394)
Description:In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
Readme
# CVE-2021-36394-Pre-Auth-RCE-in-Moodle
### Vulnerability Introduction

`Moodle` is the most popular learning management system in the world. Start creating your eLearning website in minutes!

An unauthorized remote code execution vulnerability exists in the `Shibboleth` authentication module of `Moodle`. This is widely used in universities to allow students from one university to authenticate with other universities, allowing them to take external courses and have fun with others.



### Environment setup

````
git clone https://github.com/lavclash75/CVE-2021-36394-Pre-Auth-RCE-in-Moodle.git
cd "CVE-2021-36394 Pre-Auth RCE in Moodle"
docker-compose up -d
````

Then go to `docker` and change the file `/var/www/html/moodle-3.11.0/config.php`

````
$CFG->wwwroot = 'http://127.0.0.1';
````

Change the link above to your own, it must be a real address


File Snapshot

[4.0K] /data/pocs/c0b9f1d664a5adb199c3862d3a9346257249b1b2 ├── [ 185] docker-compose.yml ├── [2.0K] exploit.py └── [ 862] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →