SB2012072404 - Multiple vulnerabilities in Moodle
Published: July 24, 2012 Updated: January 16, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2012-3398)
The vulnerability allows a remote #AU# to perform service disruption.
Algorithmic complexity vulnerability in Moodle 1.9.x before 1.9.19, 2.0.x before 2.0.10, 2.1.x before 2.1.7, and 2.2.x before 2.2.4 allows remote authenticated users to cause a denial of service (CPU consumption) by using the advanced-search feature on a database activity that has many records. Per: http://cwe.mitre.org/data/definitions/407.html 'CWE-407: Algorithmic Complexity'
2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-3390)
The vulnerability allows a remote #AU# to gain access to sensitive information.
lib/filelib.php in Moodle 2.1.x before 2.1.7 and 2.2.x before 2.2.4 does not properly restrict file access after a block has been hidden, which allows remote authenticated users to obtain sensitive information by reading a file that is embedded in a block.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2012-3391)
The vulnerability allows a remote #AU# to gain access to sensitive information.
mod/forum/rsslib.php in Moodle 2.1.x before 2.1.7 and 2.2.x before 2.2.4 does not properly implement the requirement for posting before reading a Q&A forum, which allows remote authenticated users to bypass intended access restrictions by leveraging the student role and reading the RSS feed for a forum.
4) Configuration (CVE-ID: CVE-2012-3392)
The vulnerability allows a remote #AU# to manipulate or delete data.
mod/forum/unsubscribeall.php in Moodle 2.1.x before 2.1.7 and 2.2.x before 2.2.4 does not consider whether a forum is optional, which allows remote authenticated users to bypass forum-subscription requirements by leveraging the student role and unsubscribing from all forums.
5) Cross-site scripting (CVE-ID: CVE-2012-3393)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in repository/lib.php in Moodle 2.1.x before 2.1.7 and 2.2.x before 2.2.4. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
6) SQL injection (CVE-ID: CVE-2012-3395)
The vulnerability allows a remote user to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote privileged user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
Install update from vendor's website.
References
- http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-32126
- http://openwall.com/lists/oss-security/2012/07/17/1
- http://secunia.com/advisories/49890
- http://www.securityfocus.com/bid/54481
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76964
- http://git.moodle.org/gw?p=moodle.git;a=commit;h=c58c05ad4f22c6ee1e136a7d4caaddd809a7134d
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76956
- http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-32199
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76957
- http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-31460
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76958
- http://git.moodle.org/gw?p=moodle.git&a=search&h=refs%2Fheads%2FMOODLE_22_STABLE&st=commit&s=MDL-33808
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76959
- http://git.moodle.org/gw?p=moodle.git&a=search&h=9d8d2ee6192e8b7ebb6713bd6215e06f94e2a9f7&st=commit&s=MDL-27675
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76961