Lucene search

K
mageiaGentoo FoundationMGASA-2015-0057
HistoryFeb 10, 2015 - 12:44 a.m.

Updated moodle packages fix CVE-2015-1493

2015-02-1000:44:14
Gentoo Foundation
advisories.mageia.org
16

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:C/I:N/A:N

EPSS

0.002

Percentile

54.9%

Updated moodle package fixes security vulnerability: In Moodle before 2.6.8, parameter “file” passed to scripts serving JS was not always cleaned from including “…/” in the path, allowing to read files located outside of moodle directory. All OS’s are affected, but especially vulnerable are Windows servers (CVE-2015-1493).

OSVersionArchitecturePackageVersionFilename
Mageia4noarchmoodle< 2.6.8-1moodle-2.6.8-1.mga4

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:C/I:N/A:N

EPSS

0.002

Percentile

54.9%