Vulnerability Description
comment/lib.php in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 does not properly restrict comment capabilities, which allows remote attackers to post a comment by leveraging the guest role and operating on a front-page activity.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moodle | Moodle | 2.0.0 |
Related Weaknesses (CWE)
References
- http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=9da3c2efadcc5f56cb8adc19c67
- http://moodle.org/mod/forum/discuss.php?d=182740Vendor Advisory
- http://openwall.com/lists/oss-security/2011/11/14/1
- http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=9da3c2efadcc5f56cb8adc19c67
- http://moodle.org/mod/forum/discuss.php?d=182740Vendor Advisory
- http://openwall.com/lists/oss-security/2011/11/14/1
FAQ
What is CVE-2011-4297?
CVE-2011-4297 is a vulnerability with a CVSS score of 6.4 (MEDIUM). comment/lib.php in Moodle 2.0.x before 2.0.4 and 2.1.x before 2.1.1 does not properly restrict comment capabilities, which allows remote attackers to post a comment by leveraging the guest role and op...
How severe is CVE-2011-4297?
CVE-2011-4297 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4297?
Check the references section above for vendor advisories and patch information. Affected products include: Moodle Moodle.