6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
77.2%
The remote web server hosts Moodle, an open-source course management system. Versions of Moodle prior to 1.9.14 are exposed to the following vulnerabilities :
A flaw exists in the forms API that allows form values set as constants to be altered when the user submits the form. (MSA-11-0031 / CVE-2011-4301)
A security flaw exists due to incorrect handling of openssl_verify() return codes and exposes the server to remote attacks bypassing validation. (MSA-11-0032 / CVE-2011-4302)
A denial of service vulnerability exists in the script ‘message/refresh.php’ because users could change the refresh wait time to zero. This results in an unlimited query which could exhaust system resources, denying access to legitimate users. (MSA-11-0036 / CVE-2011-4305)
A cross-site scripting (XSS) vulnerability exists due to lack of input sanitization when editing course sections. Specifically, this affects the ‘editsection.html’ values directly from user input supplied to data_submitted(). (MSA-11-0037 / CVE-2011-4306)
An unspecified SQL injection vulnerability exists when using magic quotes in the SQL query. (MSA-11-0038)
An information disclosure flaw exists in ‘mod/forum/user.php’ which exposes user names to any authenticated members, rather than only students or administrators in the same course. (MSA-11-0040 / CVE-2011-4308)
Binary data 8711.prm
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4301
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4302
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4305
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4306
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4308
moodle.org/security
www.nessus.org/u?232e2bb2
www.nessus.org/u?9fbececf
www.openwall.com/lists/oss-security/2011/11/14/1