First published: Wed Sep 19 2012(Updated: )
lib/filelib.php in Moodle 2.1.x before 2.1.8, 2.2.x before 2.2.5, and 2.3.x before 2.3.2 does not properly check the publication state of blog files, which allows remote attackers to obtain sensitive information by reading a blog entry that references a non-public file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.1.0 | |
Moodle | =2.1.1 | |
Moodle | =2.1.2 | |
Moodle | =2.1.3 | |
Moodle | =2.1.4 | |
Moodle | =2.1.5 | |
Moodle | =2.1.6 | |
Moodle | =2.1.7 | |
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 | |
Moodle | =2.2.3 | |
Moodle | =2.2.4 | |
Moodle | =2.3.0 | |
Moodle | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4407 has a medium severity rating as it allows unauthorized access to sensitive information.
To fix CVE-2012-4407, upgrade Moodle to version 2.1.8, 2.2.5, or 2.3.2 or later.
CVE-2012-4407 affects Moodle versions 2.1.0 through 2.1.7, 2.2.0 through 2.2.4, and 2.3.0 through 2.3.1.
CVE-2012-4407 is classified as an information disclosure vulnerability due to improper access controls.
Yes, CVE-2012-4407 can potentially lead to data breaches by exposing non-public files.