Lucene search

K
nessusTenable8968.PRM
HistoryOct 07, 2015 - 12:00 a.m.

Moodle 2.7.x < 2.7.9 / 2.8.x < 2.8.7 / 2.9.x < 2.9.1 Multiple Vulnerabilities

2015-10-0700:00:00
Tenable
www.tenable.com
13

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

EPSS

0.003

Percentile

69.7%

Moodle, an open-source course management system, installed on the remote host is version 2.7.x prior to 2.7.9, 2.8.x prior to 2.8.7, or 2.9.x prior to 2.9.1, and is affected by multiple vulnerabilities :

  • A flaw in the ‘clean_param()’ function in ‘lib/moodlelib.php’ that allows a cross-site redirection attack. This flaw exists because the application does not validate a certain parameter when generating error messages and allows a context-dependent attacker to create a specially crafted link that, if followed, would redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker’s choosing. (CVE-2015-3272)
  • A flaw in the ‘mod/forum/post.php’ script that is due to missing capability checks allowing an unauthorized remote attacker to post on the forum. (CVE-2015-3273)
  • A flaw that allows a stored cross-site scripting (XSS) attack. This flaw exists because the ‘user_get_user_details()’ function in the ‘user/lib.php’ script does not validate input to text profile fields before returning it to users allowing an authenticated remote attacker to create a specially crafted request that would execute arbitrary script code in a user’s browser session within the trust relationship between their browser and the server. (CVE-2015-3274)
  • A flaw in the ‘mod/scorm/prereqs.php’ and ‘mod/scorm/player.php’ scripts that are triggered during the handling of the ‘currentorg’ parameter allowing a remote attacker to inject arbitrary JavaScript content. (CVE-2015-3275)
Binary data 8968.prm

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N

EPSS

0.003

Percentile

69.7%