Korean
<< Back
VID 21773
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Moodle software is vulnerable to multiple SQL injection vulnerabilities which exist in versions prior to 1.5.3. Moodle is an open-source PHP-based course management system (CMS) for Microsoft Windows, Unix, and Linux-based platforms. Moodle version 1.5.2 and earlier versions could allow a remote attacker to execute arbitrary SQL commands via the 'id' parameter of 'course/category.php' and 'course/info.php' scripts, and the 'user' parameter of 'iplookup/ipatlas/plot.php' script. These vulnerabilities could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://rgod.altervista.org/moodle16dev.html
http://security.moodle.org/mod/forum/discuss.php?d=186
http://archives.neohapsis.com/archives/bugtraq/2005-11/0140.html

* Platforms Affected:
Martin Dougiamas, Moodle version 1.5.2 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of Moodle (1.6dev or later), available from the Moodle Web site at http://www.moodle.org

-- OR --

As a workaround, enable PHP's 'magic_quotes_gpc' setting and disable its 'register_globals' setting.
Related URL CVE-2005-3648 (CVE)
Related URL 15380 (SecurityFocus)
Related URL 23058 (ISS)