First published: Tue May 10 2022(Updated: )
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=3.11<3.11.7 | 3.11.7 |
composer/moodle/moodle | >=3.10<3.10.11 | 3.10.11 |
composer/moodle/moodle | >=3.9<3.9.14 | 3.9.14 |
composer/moodle/moodle | >=4.0<4.0.1 | 4.0.1 |
redhat/moodle | <4.0.1 | 4.0.1 |
redhat/moodle | <3.11.7 | 3.11.7 |
redhat/moodle | <3.10.11 | 3.10.11 |
redhat/moodle | <3.9.14 | 3.9.14 |
Moodle | >=3.9<3.9.14 | |
Moodle | >=3.10<3.10.11 | |
Moodle | >=3.11<3.11.7 | |
Moodle | =4.0.0 | |
Red Hat Enterprise Linux | =8.0 | |
Fedora | =34 | |
Fedora | =35 | |
Fedora | =36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30600 has a severity rating that could potentially allow unauthorized access if exploited.
To fix CVE-2022-30600, upgrade Moodle to version 3.11.7, 3.10.11, 3.9.14, or 4.0.1 or later.
Versions affected by CVE-2022-30600 include Moodle 4.0, 3.11 to 3.11.6, and earlier versions.
CVE-2022-30600 may allow attackers to bypass the account lockout threshold, potentially leading to unauthorized access.
CVE-2022-30600 poses a threat specifically to Moodle installations that are running the affected versions.