Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43432

0
Medium
VulnerabilityCVE-2024-43432cvecve-2024-43432
Published: Mon Nov 11 2024 (11/11/2024, 12:16:04 UTC)
Source: CVE Database V5

Description

A flaw was found in moodle. The cURL wrapper in Moodle strips HTTPAUTH and USERPWD headers during emulated redirects, but retains other original request headers, so HTTP authorization header information could be unintentionally sent in requests to redirect URLs.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 06:28:07 UTC

Technical Analysis

CVE-2024-43432 is a vulnerability identified in the Moodle learning management system affecting versions 0, 4.2, 4.3, and 4.4. The issue arises from the way Moodle's cURL wrapper handles HTTP authorization headers during emulated HTTP redirects. Normally, when a cURL request encounters a redirect, the wrapper strips sensitive headers such as HTTPAUTH and USERPWD to prevent leaking credentials to the redirected URL. However, in this case, while these specific headers are removed, other original request headers are retained and forwarded to the redirect destination. This behavior can inadvertently expose HTTP authorization header information, potentially leaking sensitive credentials or tokens to unintended third-party URLs. The vulnerability is classified under CWE-319 (Cleartext Transmission of Sensitive Information), indicating that sensitive data may be transmitted insecurely. The CVSS 3.1 base score is 5.3 (medium), reflecting a network attack vector with low complexity, no privileges required, and no user interaction needed, but with limited confidentiality impact and no integrity or availability impact. No public exploits have been reported yet, but the flaw could be exploited by an attacker controlling or intercepting redirect URLs to capture authorization headers. This vulnerability is particularly relevant for organizations relying on Moodle for education or training, where sensitive user credentials or tokens might be included in HTTP authorization headers during API calls or integrations.

Potential Impact

The primary impact of CVE-2024-43432 is the potential unintended disclosure of HTTP authorization header information during HTTP redirects, which can compromise the confidentiality of sensitive credentials or tokens. This leakage could enable attackers to gain unauthorized access to Moodle resources or related systems if they can intercept or control redirect URLs. Although the vulnerability does not affect data integrity or system availability, the exposure of authorization headers can facilitate further attacks such as session hijacking or privilege escalation. Organizations worldwide using affected Moodle versions may face increased risk of credential compromise, especially if their Moodle instances integrate with external services or APIs that rely on HTTP authorization headers. The impact is heightened in environments with sensitive educational data or personal information. Since exploitation does not require authentication or user interaction, attackers can attempt automated reconnaissance and exploitation over the network. However, the absence of known exploits in the wild suggests limited immediate threat but underscores the need for proactive mitigation.

Mitigation Recommendations

To mitigate CVE-2024-43432, organizations should first apply any official patches or updates released by Moodle addressing this vulnerability once available. In the absence of patches, administrators can implement the following specific measures: 1) Review and restrict the use of HTTP authorization headers in Moodle integrations, avoiding sending sensitive credentials in headers that may be forwarded during redirects. 2) Configure Moodle or underlying cURL options to disable automatic following of redirects or to sanitize headers explicitly during redirects. 3) Employ network-level controls such as web application firewalls (WAFs) to monitor and block suspicious redirect traffic that may leak authorization headers. 4) Audit and limit external redirect URLs to trusted domains only, reducing the risk of credential leakage to malicious endpoints. 5) Educate developers and administrators on secure handling of HTTP headers and redirect behavior in Moodle customizations or plugins. 6) Monitor logs for unusual redirect requests or authorization header exposures. These targeted steps go beyond generic advice by focusing on controlling header transmission during redirects and limiting exposure vectors specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
fedora
Date Reserved
2024-08-13T07:15:00.598Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd6b7ef31ef0b56974a

Added to database: 2/25/2026, 9:42:46 PM

Last enriched: 2/28/2026, 6:28:07 AM

Last updated: 4/11/2026, 7:23:03 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses