| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2012-1156
Vulnerability Database
packagist
CVE-2012-1156
Base Score
HIGH
7.5
CVE-2012-1156
Moodle before 2.2.2 has users' private files included in course backups
Vector
NETWORK
Published By
secalert@redhat.com
Published Date
Nov 14, 2019, 16:15
Affected Versions
(3)
moodle/moodle
(Packagist)
Introduced
2.2
Fixed
2.2.2
Limit
N/A
moodle/moodle
(Packagist)
Introduced
2.1
Fixed
2.1.5
Limit
N/A
moodle/moodle
(Packagist)
Introduced
2.0
Fixed
2.0.8
Limit
N/A
Package (Ecosystem)
Introduced
Fixed
Limit
moodle/moodle
(Packagist)
2.2
2.2.2
N/A
moodle/moodle
(Packagist)
2.1
2.1.5
N/A
moodle/moodle
(Packagist)
2.0
2.0.8
N/A
Weakness Type (CWE)
:
CWE-532
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
7.5
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
NONE
Availability (A)
NONE
References
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/077635.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078209.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078210.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080712.html
http://lists.fedoraproject.org/pipermail/package-announce/2012-May/081047.html
https://access.redhat.com/security/cve/cve-2012-1156
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-1156
https://moodle.org/mod/forum/discuss.php?d=198623
https://security-tracker.debian.org/tracker/CVE-2012-1156
Base Score
HIGH
7.5
Weakness Type (CWE)
:
CWE-532
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
7.5
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
NONE
Availability (A)
NONE