First published: Sun Mar 26 2017(Updated: )
In Moodle 2.x and 3.x, SQL injection can occur via user preferences.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=3.2<3.2.2 | 3.2.2 |
composer/moodle/moodle | >=3.1<3.1.5 | 3.1.5 |
composer/moodle/moodle | >=3.0<3.0.9 | 3.0.9 |
composer/moodle/moodle | >=2.7<2.7.19 | 2.7.19 |
Moodle | =2.7.0 | |
Moodle | =2.7.0-beta | |
Moodle | =2.7.0-rc1 | |
Moodle | =2.7.0-rc2 | |
Moodle | =2.7.1 | |
Moodle | =2.7.2 | |
Moodle | =2.7.3 | |
Moodle | =2.7.4 | |
Moodle | =2.7.5 | |
Moodle | =2.7.6 | |
Moodle | =2.7.7 | |
Moodle | =2.7.8 | |
Moodle | =2.7.9 | |
Moodle | =2.7.10 | |
Moodle | =2.7.11 | |
Moodle | =2.7.12 | |
Moodle | =2.7.13 | |
Moodle | =2.7.14 | |
Moodle | =2.7.15 | |
Moodle | =2.7.16 | |
Moodle | =2.7.17 | |
Moodle | =2.7.18 | |
Moodle | =3.0.0 | |
Moodle | =3.0.0-beta | |
Moodle | =3.0.0-rc1 | |
Moodle | =3.0.0-rc2 | |
Moodle | =3.0.0-rc3 | |
Moodle | =3.0.0-rc4 | |
Moodle | =3.0.1 | |
Moodle | =3.0.2 | |
Moodle | =3.0.3 | |
Moodle | =3.0.4 | |
Moodle | =3.0.5 | |
Moodle | =3.0.6 | |
Moodle | =3.0.7 | |
Moodle | =3.0.8 | |
Moodle | =3.1.0 | |
Moodle | =3.1.0-beta | |
Moodle | =3.1.0-rc1 | |
Moodle | =3.1.0-rc2 | |
Moodle | =3.1.1 | |
Moodle | =3.1.2 | |
Moodle | =3.1.3 | |
Moodle | =3.1.4 | |
Moodle | =3.2.0 | |
Moodle | =3.2.0-beta | |
Moodle | =3.2.0-rc1 | |
Moodle | =3.2.0-rc2 | |
Moodle | =3.2.0-rc3 | |
Moodle | =3.2.0-rc4 | |
Moodle | =3.2.0-rc5 | |
Moodle | =3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-2641 is considered high due to the potential for SQL injection attacks affecting user preferences.
To fix CVE-2017-2641, update Moodle to versions 2.7.19, 3.0.9, 3.1.5, or 3.2.2 or later.
CVE-2017-2641 affects Moodle versions 2.7.0 to 2.7.18 and 3.0.0 to 3.2.0.
CVE-2017-2641 is categorized as an SQL injection vulnerability.
Yes, CVE-2017-2641 can be exploited remotely by an attacker with access to user preference settings.