CVE-2012-3387: Moodle Authentication Bypass in File Upload
(updated )
Moodle 2.3.x before 2.3.1 uses only a client-side check for whether references are permitted in a file upload, which allows remote authenticated users to bypass intended alias (aka shortcut) restrictions via a client that omits this check.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33948
- openwall.com/lists/oss-security/2012/07/17/1
- exchange.xforce.ibmcloud.com/vulnerabilities/76954
- github.com/advisories/GHSA-w66h-c2vj-cm7f
- github.com/moodle/moodle/commit/3b6629c088f14c6ee8f13a009ff27441d164f334
- github.com/moodle/moodle/commit/61a339e59857fd36080f4a468a16cd6a539d90bb
- nvd.nist.gov/vuln/detail/CVE-2012-3387
- web.archive.org/web/20121104220059/http://www.securityfocus.com/bid/54481
Detect and mitigate CVE-2012-3387 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →