First published: Mon Feb 22 2016(Updated: )
Open redirect vulnerability in the clean_param function in lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an HTTP Referer header that has a substring match with a local URL.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=2.9.0<2.9.1 | 2.9.1 |
composer/moodle/moodle | >=2.8.0<2.8.7 | 2.8.7 |
composer/moodle/moodle | >=2.7.0<2.7.9 | 2.7.9 |
Moodle | =2.6.0 | |
Moodle | =2.6.1 | |
Moodle | =2.6.2 | |
Moodle | =2.6.3 | |
Moodle | =2.6.4 | |
Moodle | =2.6.5 | |
Moodle | =2.6.6 | |
Moodle | =2.6.7 | |
Moodle | =2.6.8 | |
Moodle | =2.6.9 | |
Moodle | =2.6.10 | |
Moodle | =2.7.0 | |
Moodle | =2.7.1 | |
Moodle | =2.7.2 | |
Moodle | =2.7.3 | |
Moodle | =2.7.4 | |
Moodle | =2.7.5 | |
Moodle | =2.7.6 | |
Moodle | =2.7.7 | |
Moodle | =2.7.8 | |
Moodle | =2.8.0 | |
Moodle | =2.8.1 | |
Moodle | =2.8.2 | |
Moodle | =2.8.3 | |
Moodle | =2.8.4 | |
Moodle | =2.8.5 | |
Moodle | =2.8.6 | |
Moodle | =2.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-3272 is rated as a high severity vulnerability due to its potential for facilitating phishing attacks.
To mitigate CVE-2015-3272, upgrade Moodle to version 2.7.9, 2.8.7, or 2.9.1 or later.
Moodle versions from 2.6.0 to 2.9.0 are affected by CVE-2015-3272.
CVE-2015-3272 allows attackers to perform open redirects, potentially leading to phishing attacks.
You can find more information about CVE-2015-3272 in security bulletins related to Moodle and its vulnerabilities.