Korean
<< Back
VID 210047
Severity 20
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Moodle software allows for browsing session files. Moodle is an open-source PHP-based course management system (CMS) for Microsoft Windows, Unix, and Linux-based platforms. Moodle version 1.5.2 and earlier versions could allow a remote attacker to obtain sensitive information, caused by improper restrictions on the moodledata/sessions directory. A remote attacker could exploit this vulnerability to obtain session files which contain sensitive information about users of the application, such as password MD5 hashes and email addresses.

* References:
http://www.milw0rm.com/exploits/3508
http://docs.moodle.org/en/Configuration_file

* Platforms Affected:
Martin Dougiamas, Moodle version 1.5.2 and earlier versions
Any operating system Any version
Recommendation No upgrade or patch available as of April 2007.

As a wordaround, either configure the web server to prevent directory listing or configure the application so its 'dataroot' is located outside the web server's documents directory.
Related URL CVE-2007-1647 (CVE)
Related URL (SecurityFocus)
Related URL 33147 (ISS)