SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Forum/Board/Portal)  >   Moodle Vendors:   moodle.org
Moodle Input Validation Flaw in '/blog/edit.php' Lets Remote Users Inject SQL Commands
SecurityTracker Alert ID:  1016877
SecurityTracker URL:  http://securitytracker.com/id/1016877
CVE Reference:   CVE-2006-4785   (Links to External Site)
Updated:  Jun 3 2008
Original Entry Date:  Sep 18 2006
Impact:   Disclosure of system information, Disclosure of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 1.6.1
Description:   A vulnerability was reported in Moodle. A remote user can inject SQL commands.

The '/blog/edit.php' script does not properly validate user-supplied input in the 'blogEntry' parameter. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

Omid reported this vulnerability.

Impact:   A remote user can execute SQL commands on the underlying database.
Solution:   The vendor has issued a fixed version (1.6.2), available at:

http://download.moodle.org/

Vendor URL:  www.moodle.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Sun, 17 Sep 2006 10:18:48 +0430
Subject:  Sql injection in Moodle

Hi,
There is a sql injection in Moodle 1.6.1+ (and maybe
before versions) :

The "$blogEntry" parameter passed to "insert_record()"
function in /blog/edit.php, is not checked properly .

Version 1.6.2 has been released (moodle.org).


- Omid

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC