Vulnerability Name: | CVE-2012-6105 (CCN-81743) |
Assigned: | 2012-12-06 |
Published: | 2013-01-10 |
Updated: | 2020-12-01 |
Summary: | blog/rsslib.php in Moodle 2.1.x before 2.1.10, 2.2.x before 2.2.7, 2.3.x before 2.3.4, and 2.4.x before 2.4.1 continues to provide a blog RSS feed after blogging is disabled, which allows remote attackers to obtain sensitive information by reading this feed.
|
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): Low Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-200
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2012-6105
Source: CONFIRM Type: UNKNOWN http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37467
Source: MLIST Type: UNKNOWN [oss-security] 20130121 Moodle security notifications public
Source: XF Type: UNKNOWN moodle-rsslib-info-disclosure(81743)
Source: CCN Type: MSA-13-0009 Information leak through Blog RSS
Source: CONFIRM Type: Vendor Advisory https://moodle.org/mod/forum/discuss.php?d=220166
|
Vulnerable Configuration: | Configuration 1: cpe:/a:moodle:moodle:2.1.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.5:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.4:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.6:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.7:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.1:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.8:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.2:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.3:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.9:*:*:*:*:*:*:* Configuration 2: cpe:/a:moodle:moodle:2.2.5:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.3:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.2:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.1:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.4:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.6:*:*:*:*:*:*:* Configuration 3: cpe:/a:moodle:moodle:2.3.3:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.1:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.2:*:*:*:*:*:*:* Configuration 4: cpe:/a:moodle:moodle:2.4.0:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:moodle:moodle:2.1.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.1:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.2:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.3:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.4:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.1:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.5:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.2:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.3:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.4:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.1:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.6:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.7:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.5:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.8:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.2:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.3.3:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.4.0:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.1.9:*:*:*:*:*:*:*OR cpe:/a:moodle:moodle:2.2.6:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |