First published: Mon Jul 16 2012(Updated: )
The theme implementation in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 triggers duplicate caching of Cascading Style Sheets (CSS) and JavaScript content, which allows remote attackers to bypass intended access restrictions and write to an operating-system temporary directory via unspecified vectors.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=2.1<2.1.1 | 2.1.1 |
composer/moodle/moodle | >=2.0<2.0.4 | 2.0.4 |
Moodle | =2.0.0 | |
Moodle | =2.0.1 | |
Moodle | =2.0.2 | |
Moodle | =2.0.3 | |
Moodle | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4293 has a severity rating that suggests it can lead to unauthorized access and potential data integrity issues.
To remediate CVE-2011-4293, upgrade Moodle to version 2.0.4 or later, or 2.1.1 or later.
CVE-2011-4293 affects Moodle versions 2.0.x before 2.0.4 and 2.1.x before 2.1.1.
Yes, CVE-2011-4293 allows remote attackers to bypass intended access restrictions.
CVE-2011-4293 triggers duplicate caching of Cascading Style Sheets (CSS) and JavaScript content.