First published: Wed Dec 16 2009(Updated: )
Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 does not use a random password salt in config.php, which makes it easier for attackers to conduct brute-force password guessing attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =1.9.4 | |
Moodle | =1.9.1 | |
Moodle | =1.8.8 | |
Moodle | =1.9.6 | |
Moodle | =1.8.2 | |
Moodle | =1.9.2 | |
Moodle | =1.8.5 | |
Moodle | =1.8.3 | |
Moodle | =1.8.9 | |
Moodle | =1.8.7 | |
Moodle | =1.8.10 | |
Moodle | =1.9.3 | |
Moodle | =1.9.5 | |
Moodle | =1.8.4 | |
Moodle | =1.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4304 is considered a medium severity vulnerability due to its potential for brute-force password guessing attacks.
To fix CVE-2009-4304, upgrade Moodle to version 1.8.11 or 1.9.7 or later, which includes the necessary improvements for password security.
CVE-2009-4304 affects Moodle versions 1.8 before 1.8.11 and 1.9 before 1.9.7.
The primary risk associated with CVE-2009-4304 is that attackers can exploit the lack of a random password salt to conduct successful brute-force attacks.
Mitigating CVE-2009-4304 without upgrading is challenging, but implementing strong password policies may help reduce the risk of successful brute-force attacks.