VID |
21773 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Moodle software is vulnerable to multiple SQL injection vulnerabilities which exist in versions prior to 1.5.3. Moodle is an open-source PHP-based course management system (CMS) for Microsoft Windows, Unix, and Linux-based platforms. Moodle version 1.5.2 and earlier versions could allow a remote attacker to execute arbitrary SQL commands via the 'id' parameter of 'course/category.php' and 'course/info.php' scripts, and the 'user' parameter of 'iplookup/ipatlas/plot.php' script. These vulnerabilities could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* References: http://rgod.altervista.org/moodle16dev.html http://security.moodle.org/mod/forum/discuss.php?d=186 http://archives.neohapsis.com/archives/bugtraq/2005-11/0140.html
* Platforms Affected: Martin Dougiamas, Moodle version 1.5.2 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of Moodle (1.6dev or later), available from the Moodle Web site at http://www.moodle.org
-- OR --
As a workaround, enable PHP's 'magic_quotes_gpc' setting and disable its 'register_globals' setting. |
Related URL |
CVE-2005-3648 (CVE) |
Related URL |
15380 (SecurityFocus) |
Related URL |
23058 (ISS) |
|