First published: Wed Dec 16 2009(Updated: )
Multiple unspecified authentication plugins in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 store the MD5 hashes for passwords in the user table, even when the cached hashes are not used by the plugin, which might make it easier for attackers to obtain credentials via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =1.9.4 | |
Moodle | =1.9.1 | |
Moodle | =1.8.8 | |
Moodle | =1.9.6 | |
Moodle | =1.8.2 | |
Moodle | =1.9.2 | |
Moodle | =1.8.5 | |
Moodle | =1.8.3 | |
Moodle | =1.8.9 | |
Moodle | =1.8.7 | |
Moodle | =1.8.10 | |
Moodle | =1.9.3 | |
Moodle | =1.9.5 | |
Moodle | =1.8.4 | |
Moodle | =1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4300 has a medium severity due to the potential exposure of user credentials.
To fix CVE-2009-4300, upgrade Moodle to version 1.8.11 or 1.9.7 or later.
CVE-2009-4300 affects Moodle versions 1.8.x before 1.8.11 and 1.9.x before 1.9.7.
The implications of CVE-2009-4300 include potential unauthorized access to user accounts through compromised password hashes.
Yes, upgrading to the patched versions of Moodle will resolve the vulnerabilities outlined in CVE-2009-4300.