Moodle 2.1.x < 2.1.10 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 9410

Synopsis

The remote web server is hosting a web application that is vulnerable to multiple attack vectors.

Description

The remote web server hosts Moodle, an open-source course management system. Versions of Moodle 2.1.x prior to 2.1.10 are exposed to the following vulnerabilities :

- A flaw exists that is triggered when the program fails to properly restrict users from editing custom outcomes. This may allow a remote attacker to set a custom outcome as a standard site-wide capability via editing the outcome. (CVE-2012-6098)
- A flaw exists that is due to the program failing to properly validate backup restoration paths. This may allow a remote attacker to gain access to arbitrary files. (CVE-2012-6099)
- A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when blogging is disabled globally, but existing blog posts were still displayed via the blog's RSS feed. This may allow a remote attacker to gain access to blog content that was meant to be restricted. (CVE-2012-6105)

Solution

Upgrade to Moodle version 2.1.10 or later.

See Also

https://docs.moodle.org/dev/Moodle_2.1.10_release_notes

Plugin Details

Severity: Medium

ID: 9410

Family: CGI

Published: 7/21/2016

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:moodle:moodle

Patch Publication Date: 1/14/2014

Vulnerability Publication Date: 1/21/2014

Reference Information

CVE: CVE-2012-6098, CVE-2012-6099, CVE-2012-6105

BID: 57623, 57627, 60057