First published: Wed Nov 21 2012(Updated: )
The Portfolio plugin in Moodle 2.1.x before 2.1.9, 2.2.x before 2.2.6, and 2.3.x before 2.3.3 allows remote authenticated users to upload and execute files via a modified Portfolio API callback.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.1.0 | |
Moodle | =2.1.1 | |
Moodle | =2.1.2 | |
Moodle | =2.1.3 | |
Moodle | =2.1.4 | |
Moodle | =2.1.5 | |
Moodle | =2.1.6 | |
Moodle | =2.1.7 | |
Moodle | =2.1.8 | |
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 | |
Moodle | =2.2.3 | |
Moodle | =2.2.4 | |
Moodle | =2.2.5 | |
Moodle | =2.3.0 | |
Moodle | =2.3.1 | |
Moodle | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5479 is rated as having a medium severity due to its potential for remote file execution by authenticated users.
To fix CVE-2012-5479, upgrade your Moodle installation to version 2.1.9, 2.2.6, or 2.3.3 or later.
CVE-2012-5479 affects Moodle versions 2.1.x before 2.1.9, 2.2.x before 2.2.6, and 2.3.x before 2.3.3.
CVE-2012-5479 is a file upload vulnerability that allows remote authenticated users to execute files.
If CVE-2012-5479 is exploited, it can lead to unauthorized remote execution of files on the vulnerable Moodle server.