Executive Summary



This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations
Name CVE-2009-4305 First vendor Publication 2009-12-15
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P)
Cvss Base Score 6.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

SQL injection vulnerability in the SCORM module in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 allows remote authenticated users to execute arbitrary SQL commands via vectors related to an "escaping issue when processing AICC CRS file (Course_Title)."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4305

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:13343
 
Oval ID: oval:org.mitre.oval:def:13343
Title: DSA-1986-1 moodle -- several vulnerabilities
Description: Several vulnerabilities have been discovered in Moodle, an online course management system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-4297 Multiple cross-site request forgery vulnerabilities have been discovered. CVE-2009-4298 It has been discovered that the LAMS module is prone to the disclosure of user account information. CVE-2009-4299 The Glossary module has an insufficient access control mechanism. CVE-2009-4301 Moodle does not properly check permissions when the MNET service is enabled, which allows remote authenticated servers to execute arbitrary MNET functions. CVE-2009-4302 The login/index_form.html page links to an HTTP page instead of using an SSL secured connection. CVE-2009-4303 Moodle stores sensitive data in backup files, which might make it possible for attackers to obtain them. CVE-2009-4305 It has been discovered that the SCORM module is prone to an SQL injection. Additionally, an SQL injection in the update_record function, a problem with symbolic links and a verification problem with Glossary, database and forum ratings have been fixed. For the stable distribution, these problems have been fixed in version 1.8.2.dfsg-3+lenny3. For the oldstable distribution, there are no fixed packages available and it is too hard to backport many of the fixes. Therefore, we recommend to upgrade to the lenny version. For the testing distribution and the unstable distribution , these problems have been fixed in version 1.8.2.dfsg-6. We recommend that you upgrade your moodle packages.
Family: unix Class: patch
Reference(s): DSA-1986-1
CVE-2009-4297
CVE-2009-4298
CVE-2009-4299
CVE-2009-4301
CVE-2009-4302
CVE-2009-4303
CVE-2009-4305
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moodle
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6671
 
Oval ID: oval:org.mitre.oval:def:6671
Title: DSA-1986 moodle -- several vulnerabilities
Description: Several vulnerabilities have been discovered in Moodle, an online course management system. The Common Vulnerabilities and Exposures project identifies the following problems: Multiple cross-site request forgery vulnerabilities have been discovered. It has been discovered that the LAMS module is prone to the disclosure of user account information. The Glossary module has an insufficient access control mechanism. Moodle does not properly check permissions when the MNET service is enabled, which allows remote authenticated servers to execute arbitrary MNET functions. The login/index_form.html page links to an HTTP page instead of using an SSL secured connection. Moodle stores sensitive data in backup files, which might make it possible for attackers to obtain them. It has been discovered that the SCORM module is prone to an SQL injection. Additionally, an SQL injection in the update_record function, a problem with symbolic links and a verification problem with Glossary, database and forum ratings have been fixed.
Family: unix Class: patch
Reference(s): DSA-1986
CVE-2009-4297
CVE-2009-4298
CVE-2009-4299
CVE-2009-4301
CVE-2009-4302
CVE-2009-4303
CVE-2009-4305
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): moodle
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 15

OpenVAS Exploits

Date Description
2010-02-10 Name : Debian Security Advisory DSA 1986-1 (moodle)
File : nvt/deb_1986_1.nasl
2009-12-14 Name : Fedora Core 12 FEDORA-2009-13065 (moodle)
File : nvt/fcore_2009_13065.nasl
2009-12-14 Name : Fedora Core 11 FEDORA-2009-13080 (moodle)
File : nvt/fcore_2009_13080.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
60818 Moodle SCORM Module Unspecified SQL Injection

Nessus® Vulnerability Scanner

Date Description
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1986.nasl - Type : ACT_GATHER_INFO
2010-02-15 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_moodle-100208.nasl - Type : ACT_GATHER_INFO
2010-02-15 Name : The remote openSUSE host is missing a security update.
File : suse_11_1_moodle-100208.nasl - Type : ACT_GATHER_INFO
2009-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13040.nasl - Type : ACT_GATHER_INFO
2009-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13065.nasl - Type : ACT_GATHER_INFO
2009-12-14 Name : The remote Fedora host is missing a security update.
File : fedora_2009-13080.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://docs.moodle.org/en/Moodle_1.8.11_release_notes
http://docs.moodle.org/en/Moodle_1.9.7_release_notes
http://moodle.org/mod/forum/discuss.php?d=139120
http://secunia.com/advisories/37614
http://www.securityfocus.com/bid/37244
http://www.vupen.com/english/advisories/2009/3455
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg0070...
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg0073...
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg0075...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
Date Informations
2024-11-28 23:09:45
  • Multiple Updates
2024-11-28 12:20:22
  • Multiple Updates
2021-05-04 12:10:35
  • Multiple Updates
2021-04-22 01:11:03
  • Multiple Updates
2020-12-01 17:22:46
  • Multiple Updates
2020-05-23 00:24:42
  • Multiple Updates
2016-04-26 19:18:52
  • Multiple Updates
2014-02-17 10:52:40
  • Multiple Updates
2013-05-11 00:02:21
  • Multiple Updates