Vulnerability Description
tag/tag_autocomplete.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not consider the moodle/tag:edit capability before adding a tag, which allows remote authenticated users to bypass intended access restrictions via an AJAX request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moodle | Moodle | <= 2.4.11 |
Related Weaknesses (CWE)
References
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47965Patch
- http://openwall.com/lists/oss-security/2014/11/17/11
- http://www.securitytracker.com/id/1031215
- https://moodle.org/mod/forum/discuss.php?d=275157Vendor Advisory
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-47965Patch
- http://openwall.com/lists/oss-security/2014/11/17/11
- http://www.securitytracker.com/id/1031215
- https://moodle.org/mod/forum/discuss.php?d=275157Vendor Advisory
FAQ
What is CVE-2014-7846?
CVE-2014-7846 is a vulnerability with a CVSS score of 4.0 (MEDIUM). tag/tag_autocomplete.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 does not consider the moodle/tag:edit capability before adding a tag, which allows rem...
How severe is CVE-2014-7846?
CVE-2014-7846 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-7846?
Check the references section above for vendor advisories and patch information. Affected products include: Moodle Moodle.