Moodle 2.9.x < 2.9.3 Security Bypass

medium Nessus Network Monitor Plugin ID 9189

Synopsis

The remote web server is hosting a web application that is vulnerable to a security bypass attack vector.

Description

Moodle, an open-source course management system, installed on the remote host is version 2.9.x prior to 2.9.3, and is affected by a flaw that is due to the program failing to sufficiently check settings when messaging other users. This may allow an authenticated remote attacker to bypass preferences against receiving mail from non-contacts and send spam mail to a user where it should be blocked.

Solution

Upgrade to Moodle version 2.9.3 or later.

See Also

https://docs.moodle.org/dev/Moodle_2.9.3_release_notes

Plugin Details

Severity: Medium

ID: 9189

Family: CGI

Published: 4/8/2016

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.3

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:moodle:moodle

Patch Publication Date: 11/9/2015

Vulnerability Publication Date: 11/5/2015

Reference Information

CVE: CVE-2015-5331