CVE-2014-7833: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47697
- openwall.com/lists/oss-security/2014/11/17/11
- github.com/advisories/GHSA-jq7x-gm9r-v8m7
- github.com/moodle/moodle/commit/2c639e85a32aaef4a9978e5ca139fb74ca5d6ae4
- github.com/moodle/moodle/commit/3e312a16f48dd8e8b230cb71e64295ee54992f80
- github.com/moodle/moodle/commit/c4a6c65c1bd8536484a9e53e62d3867081dedd6b
- github.com/moodle/moodle/commit/cc375a22b95b2e0f927a21ffd97c06f2276d8c14
- moodle.org/mod/forum/discuss.php?d=275155
- nvd.nist.gov/vuln/detail/CVE-2014-7833
- web.archive.org/web/20150914064838/http://www.securitytracker.com/id/1031215
Detect and mitigate CVE-2014-7833 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →