Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 does not use a random password salt in config.php, which makes it easier for attackers to conduct brute-force password guessing attacks.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://docs.moodle.org/en/Moodle_1.8.11_release_notes - Patch | |
References | () http://docs.moodle.org/en/Moodle_1.9.7_release_notes - Patch | |
References | () http://moodle.org/mod/forum/discuss.php?d=139111 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/37614 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/37244 - Patch | |
References | () http://www.vupen.com/english/advisories/2009/3455 - Patch, Vendor Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00704.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00730.html - | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00751.html - |
Information
Published : 2009-12-16 01:30
Updated : 2024-11-21 01:09
NVD link : CVE-2009-4304
Mitre link : CVE-2009-4304
CVE.ORG link : CVE-2009-4304
JSON object : View
Products Affected
moodle
- moodle
CWE
CWE-255
Credentials Management Errors