First published: Mon Jul 16 2012(Updated: )
comment/lib.php in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 does not properly restrict comment capabilities, which allows remote attackers to post a comment by leveraging the guest role and operating on a front-page activity.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.0.2 | |
Moodle | =2.0.1 | |
Moodle | =2.0.3 | |
Moodle | =2.0.0 | |
Moodle | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4297 is classified as a vulnerability that can lead to unauthorized comment posting due to insufficient restrictions.
To fix CVE-2011-4297, upgrade Moodle to version 2.0.4 or 2.1.1 or later.
CVE-2011-4297 affects Moodle versions 2.0.0 through 2.0.3 and 2.1.0.
Yes, remote attackers can exploit CVE-2011-4297 to post comments by using the guest role.
CVE-2011-4297 affects the comment/lib.php component in Moodle.