Описание
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1.9.9.dfsg2-5 |
hardy | ignored | end of life |
lucid | ignored | end of life |
maverick | ignored | end of life |
natty | ignored | end of life |
oneiric | ignored | end of life |
precise | not-affected | 1.9.9.dfsg2-5 |
quantal | not-affected | 1.9.9.dfsg2-5 |
raring | not-affected | 1.9.9.dfsg2-5 |
saucy | not-affected | 1.9.9.dfsg2-5 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and ...
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
EPSS
5 Medium
CVSS2