Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Moodle 2.2.x < 2.2.7 Multiple Vulnerabilities

Medium

Synopsis

The remote web server is hosting a web application that is vulnerable to multiple attack vectors.

Description

The remote web server hosts Moodle, an open-source course management system. Versions of Moodle 2.2.x prior to 2.2.7 are exposed to the following vulnerabilities :

- A flaw exists that is triggered when the program fails to properly restrict users from editing custom outcomes. This may allow a remote attacker to set a custom outcome as a standard site-wide capability via editing the outcome. (CVE-2012-6098) - A flaw exists that is due to the program failing to properly validate backup restoration paths. This may allow a remote attacker to gain access to arbitrary files. (CVE-2012-6099) - A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when last access is included in a list of fields forced to be hidden. This may allow a remote attacker to gain access to a users' last access. (CVE-2012-6100) - A flaw exists that allows a remote cross site redirection attack. This flaw exists because the application does not validate the 'returnurl' parameter parameter upon submission to the '/backup/backupfilesedit.php', '/comment/comment_post.php', '/course/switchrole.php', '/mod/wiki/filesedit.php', '/tag/coursetags_add.php', and '/user/files.php' scripts. This could allow a user to create a specially crafted URL, which if clicked would redirect a victim from the intended legitimate web site to an arbitrary web site of the attacker's choosing. Such attacks are useful as the crafted URL initially appear to be a web page of a trusted site. This could be leveraged to direct an unsuspecting user to a web page containing attacks that target client side software such as a web browser or document rendering programs. (CVE-2012-6101) - A flaw exists that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for sensitive transactions in the messaging system. By using a crafted URL (e.g., a crafted GET request inside an "img" tag), an attacker may trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into performing an unspecified action in the context of their session with the application, without further prompting or verification. (CVE-2012-6103) - A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when a blog post that is hidden from guest users via the web interface is then included in the related RSS feed. This may allow a remote attacker to gain access to blog posts that were intended to be restricted. (CVE-2012-6104) - A flaw exists that may lead to unauthorized disclosure of potentially sensitive information. The issue is triggered when blogging is disabled globally, but existing blog posts were still displayed via the blog's RSS feed. This may allow a remote attacker to gain access to blog content that was meant to be restricted. (CVE-2012-6105)

Solution

Upgrade to Moodle version 2.2.7 or later.