First published: Fri Dec 31 2004(Updated: )
Directory traversal vulnerability in file.php in Moodle 1.4.2 and earlier allows remote attackers to read arbitrary session files for known session IDs via a .. (dot dot) in the file parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =1.2.1 | |
Moodle | =1.4.2 | |
Moodle | =1.3.3 | |
Moodle | =1.3.2 | |
Moodle | =1.1.1 | |
Moodle | =1.3.1 | |
Moodle | =1.4.1 | |
Moodle | =1.3.4 | |
Moodle | =1.2.0 | |
Moodle | =1.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1425 is considered a high severity vulnerability due to its potential for unauthorized access to sensitive session data.
To fix CVE-2004-1425, update Moodle to a version later than 1.4.2, as this vulnerability is resolved in versions beyond this point.
CVE-2004-1425 affects Moodle versions 1.1.1 to 1.4.2.
CVE-2004-1425 allows remote attackers to perform directory traversal attacks to read arbitrary session files.
Yes, users on Moodle 1.4.2 and earlier can be exposed to unauthorized access of session files due to CVE-2004-1425.