First published: Mon Feb 22 2016(Updated: )
lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2 relies on the PHP mt_rand function to implement the random_string and complex_random_string functions, which makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=2.9.0<2.9.2 | 2.9.2 |
composer/moodle/moodle | >=2.8.0<2.8.8 | 2.8.8 |
composer/moodle/moodle | <2.7.10 | 2.7.10 |
Moodle | <=2.6.11 | |
Moodle | =2.7.0 | |
Moodle | =2.7.1 | |
Moodle | =2.7.2 | |
Moodle | =2.7.3 | |
Moodle | =2.7.4 | |
Moodle | =2.7.5 | |
Moodle | =2.7.6 | |
Moodle | =2.7.7 | |
Moodle | =2.7.8 | |
Moodle | =2.7.9 | |
Moodle | =2.8.0 | |
Moodle | =2.8.1 | |
Moodle | =2.8.2 | |
Moodle | =2.8.3 | |
Moodle | =2.8.4 | |
Moodle | =2.8.5 | |
Moodle | =2.8.6 | |
Moodle | =2.8.7 | |
Moodle | =2.9.0 | |
Moodle | =2.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-5267 is considered a medium severity vulnerability due to its potential for leading to predictable password-recovery tokens.
To fix CVE-2015-5267, you should upgrade to Moodle version 2.7.10, 2.8.8, or 2.9.2 or later.
Affected versions include Moodle up to and including 2.6.11, as well as 2.7.x before 2.7.10, 2.8.x before 2.8.8, and 2.9.x before 2.9.2.
CVE-2015-5267 exploits the reliance on the PHP mt_rand function within the random_string and complex_random_string functions.
The impact of CVE-2015-5267 allows remote attackers to predict password-recovery tokens, potentially compromising user accounts.