CVE-2012-3387

Moodle 2.3.x before 2.3.1 uses only a client-side check for whether references are permitted in a file upload, which allows remote authenticated users to bypass intended alias (aka shortcut) restrictions via a client that omits this check.
Configurations

Configuration 1 (hide)

cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:40

Type Values Removed Values Added
References () http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948 - () http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948 -
References () http://openwall.com/lists/oss-security/2012/07/17/1 - () http://openwall.com/lists/oss-security/2012/07/17/1 -
References () http://secunia.com/advisories/49890 - () http://secunia.com/advisories/49890 -
References () http://www.securityfocus.com/bid/54481 - () http://www.securityfocus.com/bid/54481 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/76954 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/76954 -

Information

Published : 2012-07-23 21:55

Updated : 2024-11-21 01:40


NVD link : CVE-2012-3387

Mitre link : CVE-2012-3387

CVE.ORG link : CVE-2012-3387


JSON object : View

Products Affected

moodle

  • moodle
CWE
CWE-264

Permissions, Privileges, and Access Controls