![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.1.1.2010.2115 |
Category: | Debian Local Security Checks |
Title: | Debian: Security Advisory (DSA-2115-1) |
Summary: | The remote host is missing an update for the Debian 'moodle' package(s) announced via the DSA-2115-1 advisory. |
Description: | Summary: The remote host is missing an update for the Debian 'moodle' package(s) announced via the DSA-2115-1 advisory. Vulnerability Insight: Several remote vulnerabilities have been discovered in Moodle, a course management system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2010-1613 Moodle does not enable the Regenerate session id during login setting by default, which makes it easier for remote attackers to conduct session fixation attacks. CVE-2010-1614 Multiple cross-site scripting (XSS) vulnerabilities allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the Login-As feature or (2) when the global search feature is enabled, unspecified global search forms in the Global Search Engine. CVE-2010-1615 Multiple SQL injection vulnerabilities allow remote attackers to execute arbitrary SQL commands via vectors related to (1) the add_to_log function in mod/wiki/view.php in the wiki module, or (2) data validation in some forms elements related to lib/form/selectgroups.php. CVE-2010-1616 Moodle can create new roles when restoring a course, which allows teachers to create new accounts even if they do not have the moodle/user:create capability. CVE-2010-1617 user/view.php does not properly check a role, which allows remote authenticated users to obtain the full names of other users via the course profile page. CVE-2010-1618 A Cross-site scripting (XSS) vulnerability in the phpCAS client library allows remote attackers to inject arbitrary web script or HTML via a crafted URL, which is not properly handled in an error message. CVE-2010-1619 A Cross-site scripting (XSS) vulnerability in the fix_non_standard_entities function in the KSES HTML text cleaning library (weblib.php) allows remote attackers to inject arbitrary web script or HTML via crafted HTML entities. CVE-2010-2228 A Cross-site scripting (XSS) vulnerability in the MNET access-control interface allows remote attackers to inject arbitrary web script or HTML via vectors involving extended characters in a username. CVE-2010-2229 Multiple cross-site scripting (XSS) vulnerabilities in blog/index.php allow remote attackers to inject arbitrary web script or HTML via unspecified parameters. CVE-2010-2230 The KSES text cleaning filter in lib/weblib.php does not properly handle vbscript URIs, which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input. CVE-2010-2231 A Cross-site request forgery (CSRF) vulnerability in report/overview/report.php in the quiz module allows remote attackers to hijack the authentication of arbitrary users for requests that delete quiz attempts via the attemptid parameter. This security update switches to a new upstream version and requires database updates. After installing the fixed package, you must visit <http://localhost/moodle/admin/> and follow the update instructions. For the stable distribution (lenny), these problems have been fixed in version ... [Please see the references for more information on the vulnerabilities] Affected Software/OS: 'moodle' package(s) on Debian 5. Solution: Please install the updated package(s). CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-4300 BugTraq ID: 37244 http://www.securityfocus.com/bid/37244 https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00704.html https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00730.html https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00751.html http://secunia.com/advisories/37614 http://www.vupen.com/english/advisories/2009/3455 Common Vulnerability Exposure (CVE) ID: CVE-2009-4304 Common Vulnerability Exposure (CVE) ID: CVE-2010-1613 SuSE Security Announcement: SUSE-SR:2010:011 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html http://www.vupen.com/english/advisories/2010/1107 Common Vulnerability Exposure (CVE) ID: CVE-2010-1614 Common Vulnerability Exposure (CVE) ID: CVE-2010-1615 Common Vulnerability Exposure (CVE) ID: CVE-2010-1616 http://tracker.moodle.org/browse/MDL-16658 Common Vulnerability Exposure (CVE) ID: CVE-2010-1617 Common Vulnerability Exposure (CVE) ID: CVE-2010-1618 Common Vulnerability Exposure (CVE) ID: CVE-2010-1619 Common Vulnerability Exposure (CVE) ID: CVE-2010-2228 40248 http://secunia.com/advisories/40248 40352 http://secunia.com/advisories/40352 ADV-2010-1530 http://www.vupen.com/english/advisories/2010/1530 ADV-2010-1571 http://www.vupen.com/english/advisories/2010/1571 FEDORA-2010-10286 http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html FEDORA-2010-10291 http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html FEDORA-2010-10321 http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html SUSE-SR:2010:014 http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html [oss-security] 20100621 Re: CVE request: moodle 1.9.9/1.8.13 multiple vulnerabilities http://www.openwall.com/lists/oss-security/2010/06/21/2 http://docs.moodle.org/en/Moodle_1.8.13_release_notes http://docs.moodle.org/en/Moodle_1.9.9_release_notes http://moodle.org/mod/forum/discuss.php?d=152366 http://tracker.moodle.org/browse/MDL-22040 https://bugzilla.redhat.com/show_bug.cgi?id=605809 Common Vulnerability Exposure (CVE) ID: CVE-2010-2229 http://cvs.moodle.org/moodle/blog/lib.php?r1=1.62.2.9&r2=1.62.2.10 http://cvs.moodle.org/moodle/blog/lib.php?r1=1.80.2.20&r2=1.80.2.21 http://moodle.org/mod/forum/discuss.php?d=152367 http://tracker.moodle.org/browse/MDL-22631 Common Vulnerability Exposure (CVE) ID: CVE-2010-2230 http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.812.2.114&r2=1.812.2.115 http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.970.2.171&r2=1.970.2.172 http://moodle.org/mod/forum/discuss.php?d=152368 http://tracker.moodle.org/browse/MDL-22042 Common Vulnerability Exposure (CVE) ID: CVE-2010-2231 http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51 http://moodle.org/mod/forum/discuss.php?d=152369 http://tracker.moodle.org/browse/MDL-21688 |
Copyright | Copyright (C) 2023 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |