Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-3272

Опубликовано: 22 фев. 2016
Источник: debian
EPSS Низкий

Описание

Open redirect vulnerability in the clean_param function in lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an HTTP Referer header that has a substring match with a local URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
moodlefixed2.7.9+dfsg-1package
moodleend-of-lifesqueezepackage

Примечания

  • http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50688

EPSS

Процентиль: 57%
0.00347
Низкий

Связанные уязвимости

CVSS3: 7.4
ubuntu
больше 9 лет назад

Open redirect vulnerability in the clean_param function in lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an HTTP Referer header that has a substring match with a local URL.

CVSS3: 7.4
nvd
больше 9 лет назад

Open redirect vulnerability in the clean_param function in lib/moodlelib.php in Moodle through 2.6.11, 2.7.x before 2.7.9, 2.8.x before 2.8.7, and 2.9.x before 2.9.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via vectors involving an HTTP Referer header that has a substring match with a local URL.

CVSS3: 7.4
github
около 3 лет назад

Moodle open redirect vulnerability

fstec
больше 9 лет назад

Уязвимость системы управления обучением Мoodle, позволяющая нарушителю перенаправить пользователей на произвольные веб-сайты

EPSS

Процентиль: 57%
0.00347
Низкий