Vulnerability Description
The TeX filter in Moodle 1.6 before 1.6.9+, 1.7 before 1.7.7+, 1.8 before 1.8.9, and 1.9 before 1.9.5 allows user-assisted attackers to read arbitrary files via an input command in a "$$" sequence, which causes LaTeX to include the contents of the file.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moodle | Moodle | 1.6.0 |
Related Weaknesses (CWE)
References
- http://cvs.moodle.org/moodle/filter/tex/filter.php?r1=1.18.4.4&r2=1.18.4.5Exploit
- http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00010.html
- http://secunia.com/advisories/34517
- http://secunia.com/advisories/34557
- http://secunia.com/advisories/34600
- http://secunia.com/advisories/35570
- http://tracker.moodle.org/browse/MDL-18552
- http://www.debian.org/security/2009/dsa-1761
- http://www.securityfocus.com/archive/1/502231/100/0/threaded
- http://www.securityfocus.com/bid/34278
- https://usn.ubuntu.com/791-2/
- https://www.exploit-db.com/exploits/8297
- https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00077.html
- https://www.redhat.com/archives/fedora-package-announce/2009-April/msg00079.html
- http://cvs.moodle.org/moodle/filter/tex/filter.php?r1=1.18.4.4&r2=1.18.4.5Exploit
FAQ
What is CVE-2009-1171?
CVE-2009-1171 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The TeX filter in Moodle 1.6 before 1.6.9+, 1.7 before 1.7.7+, 1.8 before 1.8.9, and 1.9 before 1.9.5 allows user-assisted attackers to read arbitrary files via an input command in a "$$" sequence, wh...
How severe is CVE-2009-1171?
CVE-2009-1171 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-1171?
Check the references section above for vendor advisories and patch information. Affected products include: Moodle Moodle.