| Vulnerability Name: | CVE-2005-3648 (CCN-23058) | ||||||||
| Assigned: | 2005-11-11 | ||||||||
| Published: | 2005-11-11 | ||||||||
| Updated: | 2017-07-11 | ||||||||
| Summary: | Multiple SQL injection vulnerabilities in the get_record function in datalib.php in Moodle 1.5.2 allow remote attackers to execute arbitrary SQL commands via the id parameter in (1) category.php and (2) info.php. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Data Manipulation | ||||||||
| References: | Source: CCN Type: Neohapsis Archives Message #0140 11/10/2005 Moodle <=1.6dev blind SQL Injection Source: MITRE Type: CNA CVE-2005-3648 Source: BUGTRAQ Type: UNKNOWN 20051110 Moodle <=1.6dev blind SQL Injection Source: CCN Type: Moodle Web site A Free, Open Source Course Management System for Online Learning Source: OSVDB Type: UNKNOWN 20748 Source: MISC Type: Exploit, Vendor Advisory http://rgod.altervista.org/moodle16dev.html Source: CCN Type: SA17526 Moodle Cross-Site Scripting and SQL Injection Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory 17526 Source: CCN Type: SECTRACK ID: 1015181 Moodle Input Validation Hole in `datalib.php` Lets Remote Users Inject SQL Commands and Execute PHP Code Source: SECTRACK Type: UNKNOWN 1015181 Source: CCN Type: OSVDB ID: 20748 Moodle datalib.php get_record() Function Multiple Script SQL Injection Source: CCN Type: BID-15380 Moodle Multiple SQL Injection Vulnerabilities Source: BID Type: Exploit 15380 Source: VUPEN Type: UNKNOWN ADV-2005-2387 Source: XF Type: UNKNOWN moodle-multi-scripts-sql-injection(23058) Source: XF Type: UNKNOWN moodle-multi-scripts-sql-injection(23058) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||