First published: Wed Nov 21 2012(Updated: )
The Database activity module in Moodle 2.1.x before 2.1.9, 2.2.x before 2.2.6, and 2.3.x before 2.3.3 allows remote attackers to bypass intended restrictions on reading other participants' entries via an advanced search.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.1.0 | |
Moodle | =2.1.1 | |
Moodle | =2.1.2 | |
Moodle | =2.1.3 | |
Moodle | =2.1.4 | |
Moodle | =2.1.5 | |
Moodle | =2.1.6 | |
Moodle | =2.1.7 | |
Moodle | =2.1.8 | |
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 | |
Moodle | =2.2.3 | |
Moodle | =2.2.4 | |
Moodle | =2.2.5 | |
Moodle | =2.3.0 | |
Moodle | =2.3.1 | |
Moodle | =2.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5480 is classified as a medium severity vulnerability allowing unauthorized access to user data.
To fix CVE-2012-5480, upgrade your Moodle installation to versions 2.1.9, 2.2.6, or 2.3.3 or later.
CVE-2012-5480 affects Moodle versions 2.1.0 to 2.1.8, 2.2.0 to 2.2.5, and 2.3.0 to 2.3.2.
CVE-2012-5480 enables remote attackers to bypass restrictions and read other participants' entries via advanced search.
Any Moodle installations running the affected versions prior to the patched releases are vulnerable to CVE-2012-5480.