|
Family: CGI abuses --> Category: infos
Moodle tag Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for a SQL injection flaw in Moodle Blog feature
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is susceptible
to a SQL injection attack.
Description :
The installed version of Moodle fails to properly sanitize user-
supplied input to the 'tag' parameter of the 'blog/index.php' script
before using it in database queries. Provided the blog feature is
enabled, an unauthenticated attacker may be able to leverage this
issue to manipulate database queries to reveal sensitive information,
modify data, launch attacks against the underlying database, etc.
See also :
http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0130.html
http://archives.neohapsis.com/archives/fulldisclosure/2006-10/0138.html
Solution :
Apply the patch from CVS or restrict access to the blog feature.
Threat Level:
Medium / CVSS Base Score : 5.6
(AV:R/AC:H/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|