First published: Fri Jul 20 2012(Updated: )
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | =2.0.2 | |
Moodle Moodle | =2.0.1 | |
Moodle Moodle | =2.0.4 | |
Moodle Moodle | =2.0.3 | |
Moodle Moodle | =2.0.5 | |
Moodle Moodle | =2.0.0 | |
Moodle Moodle | =2.1.2 | |
Moodle Moodle | =2.1.1 | |
Moodle Moodle | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.