VID |
210002 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Moodle Software is vulnerable to an SQL injection vulnerability via the 'tag' parameter in the 'blog/index.php' script. Moodle is an open-source PHP-based course management system (CMS) for Microsoft Windows, Unix, and Linux-based platforms. Moodle version 1.6.2 and version 1.18.2.2 are vulnerable to a SQL injection vulnerability, caused by improper filtering of user-supplied input passed to the 'tag' parameter of the 'blog/index.php' script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://www.securityfocus.com/archive/1/448018 http://www.securityfocus.com/archive/1/448023 http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049923.html http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0130.html
* Platforms Affected: Martin Dougiamas, Moodle version 1.6.2 and version 1.18.2.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Moodle (1.18.2.3 or later), available from the Moodle Web site at http://www.moodle.org |
Related URL |
CVE-2006-5219 (CVE) |
Related URL |
20395 (SecurityFocus) |
Related URL |
29377 (ISS) |
|