Vulnerability Name: | CVE-2018-16854 (CCN-153254) | ||||||||||||||||||||||||||||||||||||
Assigned: | 2018-11-19 | ||||||||||||||||||||||||||||||||||||
Published: | 2018-11-19 | ||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||||||
Summary: | A flaw was found in moodle versions 3.5 to 3.5.2, 3.4 to 3.4.5, 3.3 to 3.3.8, 3.1 to 3.1.14 and earlier. The login form is not protected by a token to prevent login cross-site request forgery. Fixed versions include 3.6, 3.5.3, 3.4.6, 3.3.9 and 3.1.15. | ||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
3.8 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-352 | ||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-16854 Source: CONFIRM Type: Patch, Vendor Advisory http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-63183 Source: CCN Type: SECTRACK ID: 1042154 Moodle Login Access Control Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks Source: BID Type: Third Party Advisory, VDB Entry 106017 Source: SECTRACK Type: Third Party Advisory, VDB Entry 1042154 Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16854 Source: XF Type: UNKNOWN moodle-cve201816854-csrf(153254) Source: CCN Type: Moodle Security Advisory MSA-18-0020 Login CSRF vulnerability in login form Source: CONFIRM Type: Vendor Advisory https://moodle.org/mod/forum/discuss.php?d=378731 Source: CCN Type: WhiteSource Vulnerability Database CVE-2018-16854 | ||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||
BACK |