First published: Fri Jul 20 2012(Updated: )
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.0.2 | |
Moodle | =2.0.1 | |
Moodle | =2.0.4 | |
Moodle | =2.0.3 | |
Moodle | =2.0.5 | |
Moodle | =2.0.0 | |
Moodle | =2.1.2 | |
Moodle | =2.1.1 | |
Moodle | =2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4592 is considered a moderate severity vulnerability due to its potential to allow remote attackers to bypass IP address restrictions.
To fix CVE-2011-4592, you should upgrade Moodle to version 2.0.6 or higher for the 2.0.x branch or version 2.1.3 or higher for the 2.1.x branch.
CVE-2011-4592 affects Moodle versions 2.0.0 through 2.0.5 and versions 2.1.0 through 2.1.2.
The impact of CVE-2011-4592 allows remote attackers to execute cron jobs while bypassing IP blocking when misconfigured.
There is no effective workaround for CVE-2011-4592, and users are strongly advised to upgrade to a patched version.