mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
103 lines
3.1 KiB
JSON
103 lines
3.1 KiB
JSON
{
|
|
"id": "CVE-2011-4287",
|
|
"sourceIdentifier": "secalert@redhat.com",
|
|
"published": "2012-07-16T10:28:36.720",
|
|
"lastModified": "2020-12-01T14:41:16.313",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "admin/uploaduser_form.php in Moodle 2.0.x before 2.0.3 does not force password changes for autosubscribed users, which makes it easier for remote attackers to obtain access by leveraging knowledge of the initial password of a new user."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "admin/uploaduser_form.php en Moodle v2.0.x anteriores a la v2.0.3 no fuerza a los usuarios autosubscribed a cambiar su contrase\u00f1a, lo que hace que sea m\u00e1s f\u00e1cil para los atacantes remotos obtener acceso aprovech\u00e1ndose de conocer la contrase\u00f1a inicial de un nuevo usuario.\r\n"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "PARTIAL",
|
|
"availabilityImpact": "PARTIAL",
|
|
"baseScore": 6.8
|
|
},
|
|
"baseSeverity": "MEDIUM",
|
|
"exploitabilityScore": 8.6,
|
|
"impactScore": 6.4,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD248A1D-CACC-4E76-925A-078B736442AE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9B8A0403-0869-495F-B7C0-13A387549C7A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "39791F43-CF89-485B-AA8B-634C282BB025"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://git.moodle.org/gw?p=moodle.git;a=commit;h=22a77963439e00441949440f0517135b3a5418da",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://moodle.org/mod/forum/discuss.php?d=175588",
|
|
"source": "secalert@redhat.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://openwall.com/lists/oss-security/2011/11/14/1",
|
|
"source": "secalert@redhat.com"
|
|
}
|
|
]
|
|
} |