Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cpp3-82c5-xhqm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

EPSS

Процентиль: 86%
0.03039
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

nvd
около 18 лет назад

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

debian
около 18 лет назад

Moodle 1.5.2 and earlier stores sensitive information under the web ro ...

EPSS

Процентиль: 86%
0.03039
Низкий