First published: Sat Mar 24 2007(Updated: )
Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | <=1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.