First published: Mon Jun 28 2010(Updated: )
Cross-site request forgery (CSRF) vulnerability in report/overview/report.php in the quiz module in Moodle before 1.8.13 and 1.9.x before 1.9.9 allows remote attackers to hijack the authentication of arbitrary users for requests that delete quiz attempts via the attemptid parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =1.5.2 | |
Moodle | =1.8.8 | |
Moodle | =1.6.1 | |
Moodle | =1.8.2 | |
Moodle | =1.2.1 | |
Moodle | =1.4.2 | |
Moodle | =1.6.8 | |
Moodle | =1.6.5 | |
Moodle | =1.3.3 | |
Moodle | =1.4.3 | |
Moodle | <=1.8.12 | |
Moodle | =1.4.5 | |
Moodle | =1.7.6 | |
Moodle | =1.6.2 | |
Moodle | =1.8.6 | |
Moodle | =1.7.1 | |
Moodle | =1.8.5 | |
Moodle | =1.8.3 | |
Moodle | =1.3.2 | |
Moodle | =1.8.9 | |
Moodle | =1.8.7 | |
Moodle | =1.8.10 | |
Moodle | =1.6.4 | |
Moodle | =1.1.1 | |
Moodle | =1.3.1 | |
Moodle | =1.6.7 | |
Moodle | =1.4.4 | |
Moodle | =1.7.3 | |
Moodle | =1.7.2 | |
Moodle | =1.5.3 | |
Moodle | =1.6.3 | |
Moodle | =1.8.11 | |
Moodle | =1.6.6 | |
Moodle | =1.5 | |
Moodle | =1.4.1 | |
Moodle | =1.7.5 | |
Moodle | =1.5.1 | |
Moodle | =1.3.4 | |
Moodle | =1.8.4 | |
Moodle | =1.8.1 | |
Moodle | =1.7.4 | |
Moodle | =1.2.0 | |
Moodle | =1.3.0 | |
Moodle | =1.6.0 | |
Moodle | =1.5.0-beta | |
Moodle | =1.9.4 | |
Moodle | =1.9.1 | |
Moodle | =1.9.6 | |
Moodle | =1.9.2 | |
Moodle | =1.9.3 | |
Moodle | =1.9.5 | |
Moodle | =1.9.8 | |
Moodle | =1.9.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2231 is considered a moderate severity vulnerability due to the potential for unauthorized users to delete quiz attempts.
To fix CVE-2010-2231, upgrade Moodle to version 1.9.9 or later, or to 1.8.13 or later.
CVE-2010-2231 allows attackers to perform cross-site request forgery (CSRF) attacks that can hijack user authentication.
Moodle versions prior to 1.8.13 and 1.9.x prior to 1.9.9 are affected by CVE-2010-2231.
Exploitation of CVE-2010-2231 is relatively easy, as it requires the attacker to trick a user into clicking a malicious link.