Moodle 2.2.x < 2.2.7 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 9412

Synopsis

The remote web server is hosting a web application that is vulnerable to multiple attack vectors.

Description

The remote web server hosts Moodle, an open-source course management system. Versions of Moodle 2.2.x prior to 2.2.7 are exposed to the following vulnerabilities :

- A flaw exists that is triggered when the program fails to properly restrict users from editing custom outcomes. This may allow a remote attacker to set a custom outcome as a standard site-wide capability via editing the outcome. (CVE-2012-6098)
- A flaw exists that is due to the program failing to properly validate backup restoration paths. This may allow a remote attacker to gain access to arbitrary files. (CVE-2012-6099)
- A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when last access is included in a list of fields forced to be hidden. This may allow a remote attacker to gain access to a users' last access. (CVE-2012-6100)
- A flaw exists that allows a remote cross site redirection attack. This flaw exists because the application does not validate the 'returnurl' parameter parameter upon submission to the '/backup/backupfilesedit.php', '/comment/comment_post.php', '/course/switchrole.php', '/mod/wiki/filesedit.php', '/tag/coursetags_add.php', and '/user/files.php' scripts. This could allow a user to create a specially crafted URL, which if clicked would redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker's choosing. Such attacks are useful as the crafted URL initially appear to be a web page of a trusted site. This could be leveraged to direct an unsuspecting user to a web page containing attacks that target client side software such as a web browser or document rendering programs. (CVE-2012-6101)
- A flaw exists that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for sensitive transactions in the messaging system. By using a crafted URL (e.g., a crafted GET request inside an "img" tag), an attacker may trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into performing an unspecified action in the context of their session with the application, without further prompting or verification. (CVE-2012-6103)
- A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when a blog post that is hidden from guest users via the web interface is then included in the related RSS feed. This may allow a remote attacker to gain access to blog posts that were intended to be restricted. (CVE-2012-6104)
- A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when blogging is disabled globally, but existing blog posts were still displayed via the blog's RSS feed. This may allow a remote attacker to gain access to blog content that was meant to be restricted. (CVE-2012-6105)

Solution

Upgrade to Moodle version 2.2.7 or later.

See Also

https://docs.moodle.org/dev/Moodle_2.2.7_release_notes

Plugin Details

Severity: Medium

ID: 9412

Family: CGI

Published: 7/21/2016

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:moodle:moodle

Patch Publication Date: 1/14/2014

Vulnerability Publication Date: 1/21/2014

Reference Information

CVE: CVE-2012-6098, CVE-2012-6099, CVE-2012-6100, CVE-2012-6101, CVE-2012-6103, CVE-2012-6104, CVE-2012-6105

BID: 57614, 57623, 57627, 60055, 60057, 60058, 60061