Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-0122

Опубликовано: 24 мар. 2014
Источник: nvd
CVSS2: 4.9
EPSS Низкий

Описание

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly check for the mod/chat:chat capability during chat sessions, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by remaining in a chat session after an intra-session capability removal by an administrator.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
Версия до 2.3.11 (включая)
cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.2.11:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*

EPSS

Процентиль: 39%
0.00171
Низкий

4.9 Medium

CVSS2

Дефекты

CWE-264

Связанные уязвимости

ubuntu
около 11 лет назад

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2.5.x before 2.5.5, and 2.6.x before 2.6.2 does not properly check for the mod/chat:chat capability during chat sessions, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by remaining in a chat session after an intra-session capability removal by an administrator.

debian
около 11 лет назад

mod/chat/chat_ajax.php in Moodle through 2.3.11, 2.4.x before 2.4.9, 2 ...

github
около 3 лет назад

Moodle allows bypass of intended access restrictions

EPSS

Процентиль: 39%
0.00171
Низкий

4.9 Medium

CVSS2

Дефекты

CWE-264