Vulnerability identifier: #VU43829
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2011-4592
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Moodle
Web applications /
Other software
Vendor: moodle.org
Description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Moodle: 2.0 - 2.0.5, 2.1 - 2.1.2
External links
https://git.moodle.org/gw?p=moodle.git;a=commit;h=ade30ad3c420ce035a3d68287db701b70e806b3f
https://moodle.org/mod/forum/discuss.php?d=191761
https://bugzilla.redhat.com/show_bug.cgi?id=761248
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.