CVE-2010-2231

Cross-site request forgery (CSRF) vulnerability in report/overview/report.php in the quiz module in Moodle before 1.8.13 and 1.9.x before 1.9.9 allows remote attackers to hijack the authentication of arbitrary users for requests that delete quiz attempts via the attemptid parameter.
References
Link Resource
http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51 Patch
http://docs.moodle.org/en/Moodle_1.8.13_release_notes
http://docs.moodle.org/en/Moodle_1.9.9_release_notes
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://moodle.org/mod/forum/discuss.php?d=152369
http://secunia.com/advisories/40248 Vendor Advisory
http://secunia.com/advisories/40352 Vendor Advisory
http://tracker.moodle.org/browse/MDL-21688
http://www.openwall.com/lists/oss-security/2010/06/21/2
http://www.vupen.com/english/advisories/2010/1530 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1571 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=605809
http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51 Patch
http://docs.moodle.org/en/Moodle_1.8.13_release_notes
http://docs.moodle.org/en/Moodle_1.9.9_release_notes
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
http://moodle.org/mod/forum/discuss.php?d=152369
http://secunia.com/advisories/40248 Vendor Advisory
http://secunia.com/advisories/40352 Vendor Advisory
http://tracker.moodle.org/browse/MDL-21688
http://www.openwall.com/lists/oss-security/2010/06/21/2
http://www.vupen.com/english/advisories/2010/1530 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2010/1571 Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=605809
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.11:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.9.8:*:*:*:*:*:*:*

History

21 Nov 2024, 01:16

Type Values Removed Values Added
References () http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51 - Patch () http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51 - Patch
References () http://docs.moodle.org/en/Moodle_1.8.13_release_notes - () http://docs.moodle.org/en/Moodle_1.8.13_release_notes -
References () http://docs.moodle.org/en/Moodle_1.9.9_release_notes - () http://docs.moodle.org/en/Moodle_1.9.9_release_notes -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html -
References () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html - () http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html -
References () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html -
References () http://moodle.org/mod/forum/discuss.php?d=152369 - () http://moodle.org/mod/forum/discuss.php?d=152369 -
References () http://secunia.com/advisories/40248 - Vendor Advisory () http://secunia.com/advisories/40248 - Vendor Advisory
References () http://secunia.com/advisories/40352 - Vendor Advisory () http://secunia.com/advisories/40352 - Vendor Advisory
References () http://tracker.moodle.org/browse/MDL-21688 - () http://tracker.moodle.org/browse/MDL-21688 -
References () http://www.openwall.com/lists/oss-security/2010/06/21/2 - () http://www.openwall.com/lists/oss-security/2010/06/21/2 -
References () http://www.vupen.com/english/advisories/2010/1530 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2010/1530 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2010/1571 - Vendor Advisory () http://www.vupen.com/english/advisories/2010/1571 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=605809 - () https://bugzilla.redhat.com/show_bug.cgi?id=605809 -

Information

Published : 2010-06-28 17:30

Updated : 2024-11-21 01:16


NVD link : CVE-2010-2231

Mitre link : CVE-2010-2231

CVE.ORG link : CVE-2010-2231


JSON object : View

Products Affected

moodle

  • moodle
CWE
CWE-352

Cross-Site Request Forgery (CSRF)