First published: Mon Jul 16 2012(Updated: )
The error-message functionality in Moodle 1.9.x before 1.9.13, 2.0.x before 2.0.4, and 2.1.x before 2.1.1 does not ensure that a continuation link refers to an http or https URL for the local Moodle instance, which might allow attackers to trick users into visiting arbitrary web sites via error message links that lead offsite.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=2.1<2.1.1 | 2.1.1 |
composer/moodle/moodle | >=2.0<2.0.4 | 2.0.4 |
composer/moodle/moodle | <1.9.13 | 1.9.13 |
Moodle | =1.9.1 | |
Moodle | =1.9.2 | |
Moodle | =1.9.3 | |
Moodle | =1.9.4 | |
Moodle | =1.9.5 | |
Moodle | =1.9.6 | |
Moodle | =1.9.7 | |
Moodle | =1.9.8 | |
Moodle | =1.9.9 | |
Moodle | =1.9.10 | |
Moodle | =1.9.11 | |
Moodle | =1.9.12 | |
Moodle | =2.0.0 | |
Moodle | =2.0.1 | |
Moodle | =2.0.2 | |
Moodle | =2.0.3 | |
Moodle | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4294 is considered a medium-severity vulnerability due to its ability to deceive users into visiting malicious websites.
To fix CVE-2011-4294, upgrade to Moodle versions 1.9.13, 2.0.4, or 2.1.1, which contain the necessary security patches.
CVE-2011-4294 affects Moodle versions 1.9.x before 1.9.13, 2.0.x before 2.0.4, and 2.1.x before 2.1.1.
CVE-2011-4294 can be exploited to carry out phishing attacks by redirecting users from error messages to malicious external sites.
As a workaround for CVE-2011-4294, users should avoid clicking on links in error messages until they can upgrade to the patched versions.