{"vulnerability": "CVE-2021-21809", "sightings": [{"uuid": "25731546-8f2a-40ab-bf26-5b9f8897a6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21809", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "b5ebd0a2-23ee-46a7-b4cd-912333198a0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21809", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:34.000000Z"}, {"uuid": "ca072e93-a436-4413-9de9-f0662bac1882", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21809", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/moodle_spelling_path_rce.rb", "content": "", "creation_timestamp": "2021-10-11T22:36:30.000000Z"}, {"uuid": "fe1a1ff0-6278-4849-bdf7-65f342997c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21809", "type": "seen", "source": "https://t.me/arpsyndicate/4861", "content": "#ExploitObserverAlert\n\nCVE-2021-21809\n\nDESCRIPTION: Exploit Observer has 16 entries in 6 file formats related to CVE-2021-21809. A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.\n\nFIRST-EPSS: 0.024130000\nNVD-IS: 6.0\nNVD-ES: 2.3\nARPS-PRIORITY: 0.9560088", "creation_timestamp": "2024-04-25T20:52:44.000000Z"}, {"uuid": "f39cbc00-7e46-4959-8df6-a835f99e046b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21809", "type": "seen", "source": "https://t.me/cibsecurity/25663", "content": "\u203c CVE-2021-21809 \u203c\n\nA command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-24T02:17:50.000000Z"}, {"uuid": "9d48300e-5fd2-42d0-85fa-d7b7d4ac2ddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-21809", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/867", "content": "CVE-2021-21809 Moodle SpellChecker Path Authenticated Remote Command Execution\nhttps://www.pwnwiki.org/index.php?title=CVE-2021-21809_Moodle_SpellChecker_Path_Authenticated_Remote_Command_Execution", "creation_timestamp": "2021-10-13T01:55:36.000000Z"}]}