VID |
210047 |
Severity |
20 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Moodle software allows for browsing session files. Moodle is an open-source PHP-based course management system (CMS) for Microsoft Windows, Unix, and Linux-based platforms. Moodle version 1.5.2 and earlier versions could allow a remote attacker to obtain sensitive information, caused by improper restrictions on the moodledata/sessions directory. A remote attacker could exploit this vulnerability to obtain session files which contain sensitive information about users of the application, such as password MD5 hashes and email addresses.
* References: http://www.milw0rm.com/exploits/3508 http://docs.moodle.org/en/Configuration_file
* Platforms Affected: Martin Dougiamas, Moodle version 1.5.2 and earlier versions Any operating system Any version |
Recommendation |
No upgrade or patch available as of April 2007.
As a wordaround, either configure the web server to prevent directory listing or configure the application so its 'dataroot' is located outside the web server's documents directory. |
Related URL |
CVE-2007-1647 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
33147 (ISS) |
|