First published: Wed Jul 11 2012(Updated: )
Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 allows remote attackers to bypass intended access restrictions and perform global searches by leveraging the guest role and making a direct request to a URL.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.0.0 | |
Moodle | =2.0.1 | |
Moodle | =2.0.2 | |
Moodle | =2.0.3 | |
Moodle | =2.0.4 | |
Moodle | =2.1.0 | |
Moodle | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4309 is considered a medium severity vulnerability due to its ability to bypass access restrictions.
To fix CVE-2011-4309, upgrade Moodle to version 2.0.5 or 2.1.2 or later.
CVE-2011-4309 affects Moodle versions 2.0.0 to 2.0.4 and 2.1.0 to 2.1.1.
The impact of CVE-2011-4309 allows remote attackers to perform unauthorized global searches.
CVE-2011-4309 can be exploited by remote attackers using the guest role to access restricted information.