|
Family: CGI abuses --> Category: infos
Moodle < 1.5.3 Multiple SQL Injection Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple SQL vulnerabilities in Moodle < 1.5.3
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple SQL injection issues.
Description :
The remote installation of Moodle fails to sanitize user-supplied
input to the id' parameter of 'course/category.php' and
'course/info.php' scripts as well as the 'user' parameter of
'iplookup/ipatlas/plot.php' script before using it in database
queries. A possible hacker may be able to exploit these issues to launch
SQL injection attacks against the affected application, possibly
levering them to run arbitrary PHP code on the remote host, subject to
the permissions of the web server user id.
See also :
http://retrogod.altervista.org/moodle16dev.html
http://security.moodle.org/mod/forum/discuss.php?d=186
Solution :
Upgrade to Moodle 1.5.3 or later when it becomes available or enable
PHP's 'magic_quotes_gpc' setting and disable its 'register_globals'
setting.
Threat Level:
High / CVSS Base Score : 7.0
(AV:R/AC:L/Au:NR/C:P/I:P/A:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|