Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-f9m9-494r-w36p

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью

Описание

Moodle allows bypass of intended access restrictions

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly check for the mod/chat:chat capability during chat sessions, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by remaining in a chat session after an intra-session capability removal by an administrator.

Пакеты

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

< 2.4.9

2.4.9

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

>= 2.5.0, < 2.5.5

2.5.5

Наименование

moodle/moodle

composer
Затронутые версииВерсия исправления

>= 2.6.0, < 2.6.2

2.6.2

EPSS

Процентиль: 39%
0.00171
Низкий

Связанные уязвимости

ubuntu
около 11 лет назад

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly check for the mod/chat:chat capability during chat sessions, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by remaining in a chat session after an intra-session capability removal by an administrator.

nvd
около 11 лет назад

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly check for the mod/chat:chat capability during chat sessions, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by remaining in a chat session after an intra-session capability removal by an administrator.

debian
около 11 лет назад

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2 ...

EPSS

Процентиль: 39%
0.00171
Низкий