CVE-2015-0211: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
mod/lti/ajax.php in Moodle through 2.5.9, 2.6.x before 2.6.7, 2.7.x before 2.7.4, and 2.8.x before 2.8.2 does not consider the moodle/course:manageactivities and mod/lti:addinstance capabilities before proceeding with registered-tool list searches, which allows remote authenticated users to obtain sensitive information via requests to the LTI Ajax service.
References
- git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47920
- openwall.com/lists/oss-security/2015/01/19/1
- github.com/advisories/GHSA-frhc-9hwc-x7j3
- github.com/moodle/moodle/commit/52555c36989b6704550ed0b3c6e832f5e7e150b7
- github.com/moodle/moodle/commit/da4c33f510aabc0d7443c29a7c097cfd54b6c4a4
- github.com/moodle/moodle/commit/faf0cd9098517cd6274219b58f6f4a278d26455d
- github.com/moodle/moodle/commit/fc6619d5c0bb297e6736880ff5353bb668048002
- moodle.org/mod/forum/discuss.php?d=278611
- nvd.nist.gov/vuln/detail/CVE-2015-0211
Detect and mitigate CVE-2015-0211 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →