Vulnerability Name:

CVE-2011-1402 (CCN-67396)

Assigned:2011-05-10
Published:2011-05-10
Updated:2017-08-17
Summary:Mahara before 1.3.6 allows remote authenticated users to bypass intended access restrictions, and suspend a user account, edit a view, visit a view, edit a plan artefact, read a plans block, read a plan artefact, edit a blog, read a blog block, read a blog artefact, or access a block, via a request associated with (1) admin/users/search.json.php, (2) view/newviewtoken.json.php, (3) lib/mahara.php, (4) artefact/plans/tasks.json.php, (5) artefact/plans/viewtasks.json.php, (6) artefact/blog/view/index.json.php, (7) artefact/blog/posts.json.php, or (8) blocktype/myfriends/myfriends.json.php, related to incorrect privilege enforcement, a missing user id check, and incorrect enforcement of the Overriding Start/Stop Dates setting.
CVSS v3 Severity:4.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
4.8 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
5.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:M/C:P/I:P/A:P)
4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:M/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Multiple_Instances
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2011-1402

Source: CCN
Type: SA44433
Mahara Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
44433

Source: DEBIAN
Type: UNKNOWN
DSA-2246

Source: DEBIAN
Type: DSA-2246
mahara -- several vulnerabilities

Source: BID
Type: UNKNOWN
47798

Source: CCN
Type: BID-47798
Mahara Versions Prior to 1.3.6 Multiple Remote Vulnerabilities

Source: XF
Type: UNKNOWN
mahara-cve20111402-sec-bypass(67396)

Source: XF
Type: UNKNOWN
mahara-newviewtokenjson-sec-bypass(67396)

Source: XF
Type: UNKNOWN
mahara-searchjson-sec-bypass(67397)

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/746182

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/771592

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/771614

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/771623

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/771637

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/771644

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/771653

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+bug/772140

Source: CCN
Type: Mahara Web site
Mahara 1.3.6

Source: CONFIRM
Type: Patch
https://launchpad.net/mahara/+milestone/1.3.6

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2011-1402

Vulnerable Configuration:Configuration 1:
  • cpe:/a:mahara:mahara:0.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:0.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:0.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.7:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.8:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.9:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.10:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.11:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.13:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.14:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.0.15:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:alpha1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:alpha2:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:alpha3:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.7:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.8:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.1.9:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:alpha1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:alpha2:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:alpha3:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.5:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.2.6:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.0:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:1.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:mahara:mahara:*:*:*:*:*:*:*:* (Version <= 1.3.5)

  • Configuration CCN 1:
  • cpe:/a:mahara:mahara:1.3.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:13046
    P
    DSA-2246-1 mahara -- several vulnerabilities
    2014-06-23
    BACK
    mahara mahara 0.9.0
    mahara mahara 0.9.1
    mahara mahara 0.9.2
    mahara mahara 1.0.0
    mahara mahara 1.0.1
    mahara mahara 1.0.2
    mahara mahara 1.0.3
    mahara mahara 1.0.4
    mahara mahara 1.0.5
    mahara mahara 1.0.6
    mahara mahara 1.0.7
    mahara mahara 1.0.8
    mahara mahara 1.0.9
    mahara mahara 1.0.10
    mahara mahara 1.0.11
    mahara mahara 1.0.12
    mahara mahara 1.0.13
    mahara mahara 1.0.14
    mahara mahara 1.0.15
    mahara mahara 1.1
    mahara mahara 1.1.0
    mahara mahara 1.1.0 alpha1
    mahara mahara 1.1.0 alpha2
    mahara mahara 1.1.0 alpha3
    mahara mahara 1.1.0 beta1
    mahara mahara 1.1.0 beta2
    mahara mahara 1.1.0 beta3
    mahara mahara 1.1.0 beta4
    mahara mahara 1.1.0 rc1
    mahara mahara 1.1.0 rc2
    mahara mahara 1.1.1
    mahara mahara 1.1.2
    mahara mahara 1.1.3
    mahara mahara 1.1.4
    mahara mahara 1.1.5
    mahara mahara 1.1.6
    mahara mahara 1.1.7
    mahara mahara 1.1.8
    mahara mahara 1.1.9
    mahara mahara 1.2.0
    mahara mahara 1.2.0 alpha1
    mahara mahara 1.2.0 alpha2
    mahara mahara 1.2.0 alpha3
    mahara mahara 1.2.0 beta1
    mahara mahara 1.2.0 beta2
    mahara mahara 1.2.0 beta3
    mahara mahara 1.2.0 beta4
    mahara mahara 1.2.0 rc1
    mahara mahara 1.2.1
    mahara mahara 1.2.2
    mahara mahara 1.2.3
    mahara mahara 1.2.4
    mahara mahara 1.2.5
    mahara mahara 1.2.6
    mahara mahara 1.3.0
    mahara mahara 1.3.0 beta1
    mahara mahara 1.3.0 beta2
    mahara mahara 1.3.0 beta3
    mahara mahara 1.3.0 beta4
    mahara mahara 1.3.0 rc1
    mahara mahara 1.3.1
    mahara mahara 1.3.2
    mahara mahara 1.3.3
    mahara mahara 1.3.4
    mahara mahara *
    mahara mahara 1.3.5