First published: Fri Jun 18 2010(Updated: )
Moodle upstream has released v1.9.9 and v1.8.13: <a href="http://docs.moodle.org/en/Moodle_1.9.9_release_notes">http://docs.moodle.org/en/Moodle_1.9.9_release_notes</a> <a href="http://docs.moodle.org/en/Moodle_1.8.13_release_notes">http://docs.moodle.org/en/Moodle_1.8.13_release_notes</a> Which address the following issues: * MSA-10-0010 Persistent Cross Site Scripting vulnerability in the MNET access control interface * MSA-10-0011 Cross Site Scripting vulnerability in blog/index.php * MSA-10-0012 KSES Security Filter Bypassing vulnerability * MSA-10-0013 Potential Cross Site Scripting vulnerability in Quiz reports These would affect Fedora (currently 1.9.8) and EPEL (currently 1.8.12).
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | <1.9.9 | |
Moodle | <1.8.13 | |
Moodle | <1.9.8 | |
Moodle | <1.8.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-605809 relates to vulnerabilities in Moodle versions prior to 1.9.9 and 1.8.13 that can lead to security issues.
To fix REDHAT-BUG-605809, update Moodle to version 1.9.9 or 1.8.13.
REDHAT-BUG-605809 affects Moodle versions earlier than 1.9.9 and 1.8.13.
REDHAT-BUG-605809 may impact the security and integrity of user data within affected Moodle installations.
There is no documented workaround for REDHAT-BUG-605809; updating to the latest version is recommended.