René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

203 lines
6.5 KiB
JSON

{
"id": "CVE-2009-4302",
"sourceIdentifier": "cve@mitre.org",
"published": "2009-12-16T01:30:00.453",
"lastModified": "2020-12-01T14:43:53.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "login/index_form.html in Moodle 1.8 before 1.8.11 and 1.9 before 1.9.7 links to an index page on the HTTP port even when the page is served from an HTTPS port, which might cause login credentials to be sent in cleartext, even when SSL is intended, and allows remote attackers to obtain these credentials by sniffing."
},
{
"lang": "es",
"value": "login/index_form.html en Moodle v1.8 anteriores a v1.8.11 y v1.9 anteriores a v1.9.7 enlaza a una pagina inicial en un puerto HTTP incluso cuando la pagina es servida desde un puerto HTTPS, lo que podr\u00eda causar que las credenciales fuesen enviadas en texto plano, incluso cuando el env\u00edo SSl este previsto, lo que permitir\u00eda atacantes obtener esas credenciales mediante la interceptaci\u00f3n."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-310"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "492A28FE-A2F8-4FF7-AC5B-0C3F5508506D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "28A897CA-3D8F-4575-BBD2-1C0C5A2ECC99"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A4A3A5D9-D96E-46B3-AC22-25045564EB96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF91F8EA-1737-4E11-9931-ACAFB4BC0018"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1E81E148-5710-439C-8A1A-884D27640AAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2C0217-A25A-4D0A-8CC6-64DEBC9E198F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "7949FC50-81B9-44AD-BB1B-91D025B34FF6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.9:*:*:*:*:*:*:*",
"matchCriteriaId": "83AA5D08-CF62-45A8-A8FE-18F76BA8ECA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.8.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2C61F076-71AC-4AEF-BECF-9EF0B05CEB77"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "24F2602B-8ED3-4026-A9A4-31BE8BDC7724"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F24649-B67F-4809-9F54-7B623AEF5A4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6B81655E-C3B5-4115-A4C4-B7AC2FCDAB7F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ED9C3840-66BE-47EC-9F0C-E9D2171FF0B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DBD062EB-1B1F-4DC8-A4F9-C2EC7D401E9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:moodle:moodle:1.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "291F73E9-1059-4E7F-860F-0DF2A35AA456"
}
]
}
]
}
],
"references": [
{
"url": "http://docs.moodle.org/en/Moodle_1.8.11_release_notes",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://docs.moodle.org/en/Moodle_1.9.7_release_notes",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://moodle.org/mod/forum/discuss.php?d=139107",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/37244",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://www.vupen.com/english/advisories/2009/3455",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00704.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00730.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://www.redhat.com/archives/fedora-package-announce/2009-December/msg00751.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}