First published: Tue Jul 17 2012(Updated: )
The webservices functionality in Moodle 2.0.x before 2.0.7, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 allows remote authenticated users to bypass the deleted status and continue using a server via a token.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=2.0<2.0.7 | 2.0.7 |
composer/moodle/moodle | >=2.1<2.1.4 | 2.1.4 |
composer/moodle/moodle | >=2.2<2.2.1 | 2.2.1 |
Moodle | >=2.0<=2.0.6 | |
Moodle | >=2.1<=2.1.3 | |
Moodle | =2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0797 is classified as a high severity vulnerability due to the potential for unauthorized access to web services.
To fix CVE-2012-0797, upgrade Moodle to version 2.0.7 or later, 2.1.4 or later, or 2.2.1 or later.
Moodle versions 2.0.x before 2.0.7, 2.1.x before 2.1.4, and 2.2.x before 2.2.1 are affected by CVE-2012-0797.
Yes, CVE-2012-0797 allows remote authenticated users to exploit the vulnerability via a token.
If CVE-2012-0797 is not patched, attackers may be able to bypass account deletions and access web services.