{ "id": "CVE-2015-3177", "sourceIdentifier": "secalert@redhat.com", "published": "2015-06-01T19:59:20.087", "lastModified": "2020-12-01T14:52:42.637", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Moodle 2.8.x before 2.8.6 does not consider the tool/monitor:subscribe capability before entering subscriptions to site-wide event-monitor rules, which allows remote authenticated users to obtain sensitive information via a subscription request." }, { "lang": "es", "value": "Moodle 2.8.x anterior a 2.8.6 no considera la capacidad tool/monitor:subscribe antes de entrar suscripciones en reglas de la monitorizaci\u00f3n de eventos en todos los sitios, lo que permite a usuarios remotos autenticados obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud de suscripci\u00f3n." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 3.5 }, "baseSeverity": "LOW", "exploitabilityScore": 6.8, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-17" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:moodle:moodle:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "12737AF4-B2D5-4661-B06A-6A06FE95EC2D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:moodle:moodle:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "88C59A94-D225-478A-B23E-41C4324BC643" }, { "vulnerable": true, "criteria": "cpe:2.3:a:moodle:moodle:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "192EA69B-A1E1-4E0D-8E73-76EB74CCDE49" }, { "vulnerable": true, "criteria": "cpe:2.3:a:moodle:moodle:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "D88385B1-EEFB-4825-BD8F-215C39FD86DA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:moodle:moodle:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "A3BE2782-D167-4237-B57D-2E4C04571524" }, { "vulnerable": true, "criteria": "cpe:2.3:a:moodle:moodle:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "F277F979-12FA-47A5-B0A5-D174C2127A7D" } ] } ] } ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50039", "source": "secalert@redhat.com" }, { "url": "http://openwall.com/lists/oss-security/2015/05/18/1", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/74721", "source": "secalert@redhat.com" }, { "url": "http://www.securitytracker.com/id/1032358", "source": "secalert@redhat.com" }, { "url": "https://moodle.org/mod/forum/discuss.php?d=313684", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] } ] }