Lucene search

K
openvasCopyright (C) 2009 Greenbone Networks GmbHOPENVAS:800240
HistoryMar 03, 2009 - 12:00 a.m.

Moodle CMS Multiple Vulnerabilities

2009-03-0300:00:00
Copyright (C) 2009 Greenbone Networks GmbH
plugins.openvas.org
6

0.003 Low

EPSS

Percentile

63.6%

This host is running Moodle CMS and is prone to Multiple
Vulnerabilities.

###############################################################################
# OpenVAS Vulnerability Test
# $Id: gb_moodle_cms_mult_vuln.nasl 4869 2016-12-29 11:01:45Z teissa $
#
# Moodle CMS Multiple Vulnerabilities
#
# Authors:
# Sujit Ghosal <[email protected]>
#
# Copyright:
# Copyright (c) 2009 Greenbone Networks GmbH, http://www.greenbone.net
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2
# (or any later version), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
###############################################################################

tag_impact = "Successful exploitation will allow remote attackers to cause Cross Site
  Scripting attacks, can gain sensitive information about the user or the
  remote host or can delete unauthorised posts through injecting malicious
  web scripts.

  Impact level: System/Application";

tag_affected = "Moodle version from 1.6 prior to 1.6.9,
  Moodle version from 1.7 prior to 1.7.7,
  Moodle version from 1.8 prior to 1.8.8 and 
  Moodle version from 1.9 prior to 1.9.4 on all platforms.";
tag_insight = "Multiple flaws are due to
  - Vulnerability in post.php for IMG tag which allows unauthorised access
    to user's posts.
  - XSS Vulnerability in course/lib.php which allows injection of arbitrary
    web scripts or malicious HTML codes while displaying the log report in
    browser due to lack of sanitization.
  - Unspecified vulnerability in the Calendar export feature which causes
    conducting brute force attacks.
  - XSS Vulnerability in blocks/html/block_html.php which allows injection
    of arbitracy scripts of malformed HTML codes injection.";
tag_solution = "Upgrade to latest version 1.6.9, 1.7.7, 1.8.8 and 1.9.4
  http://moodle.org/downloads";
tag_summary = "This host is running Moodle CMS and is prone to Multiple
  Vulnerabilities.";

if(description)
{
  script_id(800240);
  script_version("$Revision: 4869 $");
  script_tag(name:"last_modification", value:"$Date: 2016-12-29 12:01:45 +0100 (Thu, 29 Dec 2016) $");
  script_tag(name:"creation_date", value:"2009-03-03 06:56:37 +0100 (Tue, 03 Mar 2009)");
  script_tag(name:"cvss_base", value:"6.4");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:P");
  script_cve_id("CVE-2009-0499", "CVE-2009-0500", "CVE-2009-0501", "CVE-2009-0502");
  script_bugtraq_id(33617, 33615, 33612, 32402);
  script_name("Moodle CMS Multiple Vulnerabilities");
  script_xref(name : "URL" , value : "http://moodle.org/security");
  script_xref(name : "URL" , value : "http://www.openwall.com/lists/oss-security/2009/02/04/1");

  script_tag(name:"qod_type", value:"remote_banner");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2009 Greenbone Networks GmbH");
  script_family("Web application abuses");
  script_dependencies("gb_moodle_cms_detect.nasl");
  script_require_ports("Services/www", 80);
  script_require_keys("Moodle/Version");
  script_tag(name : "affected" , value : tag_affected);
  script_tag(name : "insight" , value : tag_insight);
  script_tag(name : "solution" , value : tag_solution);
  script_tag(name : "summary" , value : tag_summary);
  script_tag(name : "impact" , value : tag_impact);
  exit(0);
}


include("http_func.inc");
include("version_func.inc");

moodlePort = get_http_port(default:80);
if(!moodlePort){
  exit(0);
}

if(!get_kb_item(string("www/", moodlePort, "/moodle")))exit(0);

moodleVer = get_kb_item("Moodle/Version");
if(!moodleVer){
  exit(0);
}

# Grep for Moodle CMS Version
if(version_in_range(version:moodleVer, test_version:"1.6", test_version2:"1.6.8") ||
   version_in_range(version:moodleVer, test_version:"1.7", test_version2:"1.7.6") ||
   version_in_range(version:moodleVer, test_version:"1.8", test_version2:"1.8.7") ||
   version_in_range(version:moodleVer, test_version:"1.9", test_version2:"1.9.3")){
  security_message(moodlePort);
}

0.003 Low

EPSS

Percentile

63.6%