First published: Sun Jan 27 2013(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in user/messageselect.php in the messaging system in Moodle 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 allow remote attackers to hijack the authentication of arbitrary users for requests that send course messages.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 | |
Moodle | =2.2.3 | |
Moodle | =2.2.4 | |
Moodle | =2.2.5 | |
Moodle | =2.2.6 | |
Moodle | =2.3.0 | |
Moodle | =2.3.1 | |
Moodle | =2.3.2 | |
Moodle | =2.3.3 | |
Moodle | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6103 has a moderate severity level due to its potential for cross-site request forgery effects.
To fix CVE-2012-6103, upgrade Moodle to versions 2.2.7, 2.3.4, or 2.4.1 or later.
CVE-2012-6103 affects Moodle versions 2.2.0 to 2.2.6, 2.3.0 to 2.3.3, and 2.4.0.
CVE-2012-6103 can facilitate attacks that hijack the authentication of users sending course messages through CSRF.
Yes, user data is at risk as attackers can potentially send unauthorized course messages impersonating legitimate users.