Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.100697
Category:Web application abuses
Title:Mahara Multiple Remote Vulnerabilities
Summary:Mahara is prone to multiple remote vulnerabilities, including:;; 1. Multiple HTML-injection vulnerabilities;; 2. A cross-site request-forgery vulnerability;; 3. Multiple SQL-injection vulnerabilities;; 4. An authentication-bypass vulnerability
Description:Summary:
Mahara is prone to multiple remote vulnerabilities, including:

1. Multiple HTML-injection vulnerabilities

2. A cross-site request-forgery vulnerability

3. Multiple SQL-injection vulnerabilities

4. An authentication-bypass vulnerability

Vulnerability Impact:
Exploiting these issues could allow an attacker to steal cookie-based
authentication credentials, control how the site is rendered to the
user, compromise the application, access or modify data, or exploit
latent vulnerabilities in the underlying database, gain unauthorized
access to the application and perform certain administrative tasks.

Solution:
Updates are available. Please see the references for more information.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-1667
BugTraq ID: 41319
http://www.securityfocus.com/bid/41319
http://secunia.com/advisories/40431
XForce ISS Database: mahara-multiple-unspecified-xss(59993)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59993
Common Vulnerability Exposure (CVE) ID: CVE-2010-1668
XForce ISS Database: mahara-multiple-unspecified-csrf(59994)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59994
Common Vulnerability Exposure (CVE) ID: CVE-2010-1669
XForce ISS Database: mahara-unspecified-sql-injection(59995)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59995
Common Vulnerability Exposure (CVE) ID: CVE-2010-1670
CopyrightCopyright (C) 2010 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.