First published: Sun Jan 27 2013(Updated: )
Multiple open redirect vulnerabilities in Moodle 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors related to (1) backup/backupfilesedit.php, (2) comment/comment_post.php, (3) course/switchrole.php, (4) mod/wiki/filesedit.php, (5) tag/coursetags_add.php, or (6) user/files.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 | |
Moodle | =2.2.3 | |
Moodle | =2.2.4 | |
Moodle | =2.2.5 | |
Moodle | =2.2.6 | |
Moodle | =2.3.0 | |
Moodle | =2.3.1 | |
Moodle | =2.3.2 | |
Moodle | =2.3.3 | |
Moodle | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6101 is classified as a medium severity vulnerability due to its ability to facilitate phishing attacks.
To fix CVE-2012-6101, update Moodle to version 2.2.7, 2.3.4, or 2.4.1 or later.
CVE-2012-6101 affects Moodle versions 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1.
CVE-2012-6101 exploits users by allowing attackers to redirect them to arbitrary websites, potentially conducting phishing attacks.
The components involved in CVE-2012-6101 include backup/backupfilesedit.php and comment/comment_post.php.