First published: Sun Jan 27 2013(Updated: )
lib.php in the Submission comments plugin in the Assignment module in Moodle 2.3.x before 2.3.4 and 2.4.x before 2.4.1 allows remote attackers to read or modify the submission comments (aka feedback comments) of arbitrary users via a crafted URI.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.3.0 | |
Moodle | =2.3.1 | |
Moodle | =2.3.2 | |
Moodle | =2.3.3 | |
Moodle | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6102 is considered a medium severity vulnerability due to its potential to allow unauthorized access to submission comments.
To fix CVE-2012-6102, upgrade Moodle to version 2.3.4 or 2.4.1 or later.
Users of Moodle versions 2.3.0 to 2.3.3 and 2.4.0 are affected by CVE-2012-6102.
The impact of CVE-2012-6102 allows remote attackers to read or alter submission comments of arbitrary users.
CVE-2012-6102 is classified as an improper access control vulnerability.