Lucene search

K
nessusTenable9414.PRM
HistoryJul 21, 2016 - 12:00 a.m.

Moodle 2.4.x < 2.4.1 Multiple Vulnerabilities

2016-07-2100:00:00
Tenable
www.tenable.com
14

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

70.5%

The remote web server hosts Moodle, an open-source course management system. Versions of Moodle 2.4.x prior to 2.4.1 are exposed to the following vulnerabilities :

  • A flaw exists that is triggered when the program fails to properly restrict users from editing custom outcomes. This may allow a remote attacker to set a custom outcome as a standard site-wide capability via editing the outcome. (CVE-2012-6098)
  • A flaw exists that is due to the program failing to properly validate backup restoration paths. This may allow a remote attacker to gain access to arbitrary files. (CVE-2012-6099)
  • A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when last access is included in a list of fields forced to be hidden. This may allow a remote attacker to gain access to a users’ last access. (CVE-2012-6100)
  • A flaw exists that allows a remote cross site redirection attack. This flaw exists because the application does not validate the ‘returnurl’ parameter parameter upon submission to the ‘/backup/backupfilesedit.php’, ‘/comment/comment_post.php’, ‘/course/switchrole.php’, ‘/mod/wiki/filesedit.php’, ‘/tag/coursetags_add.php’, and ‘/user/files.php’ scripts. This could allow a user to create a specially crafted URL, which if clicked would redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker’s choosing. Such attacks are useful as the crafted URL initially appear to be a web page of a trusted site. This could be leveraged to direct an unsuspecting user to a web page containing attacks that target client side software such as a web browser or document rendering programs. (CVE-2012-6101)
  • A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when handling URLs in the assignment module, which may allow a remote attacker to view feedback comments on other user’s submissions. (CVE-2012-6102)
  • A flaw exists that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for sensitive transactions in the messaging system. By using a crafted URL (e.g., a crafted GET request inside an “img” tag), an attacker may trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into performing an unspecified action in the context of their session with the application, without further prompting or verification. (CVE-2012-6103)
  • A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when a blog post that is hidden from guest users via the web interface is then included in the related RSS feed. This may allow a remote attacker to gain access to blog posts that were intended to be restricted. (CVE-2012-6104)
  • A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when blogging is disabled globally, but existing blog posts were still displayed via the blog’s RSS feed. This may allow a remote attacker to gain access to blog content that was meant to be restricted. (CVE-2012-6105)
  • An unspecified flaw exists that may allow a remote attacker to delete course level calendar subscriptions created by arbitrary users. No further details have been provided. (CVE-2012-6106)
Binary data 9414.prm

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

70.5%