This exploit demonstrates an unrestricted file upload vulnerability in Moodle versions 3.8 and earlier, allowing an attacker to upload a malicious PHP file disguised as an image. The provided PHP shellcode executes a base64-encoded payload that can lead to remote code execution (RCE).
Classification
Working Poc 90%
Attack Type
Rce
Complexity
Moderate
Reliability
Reliable
Target:Moodle 3.8 and earlier
Auth required
Prerequisites:Valid Moodle session cookie · Access to the file upload functionality