Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-cpp3-82c5-xhqm

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

EPSS

Процентиль: 91%
0.06088
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

nvd
почти 19 лет назад

Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.

debian
почти 19 лет назад

Moodle 1.5.2 and earlier stores sensitive information under the web ro ...

EPSS

Процентиль: 91%
0.06088
Низкий