Moodle 'moodledata/sessions' Session Files Remote Information Disclosure

medium Nessus Plugin ID 24874

Synopsis

The remote web server contains a PHP application that is affected by an information disclosure vulnerability.

Description

The version of Moodle on the remote host allows a remote attacker to browse session files, which likely contain sensitive information about users of the application, such as password hashes and email addresses.

Solution

Either configure the web server to prevent directory listing or configure the application so its 'dataroot' is located outside the web server's documents directory.

See Also

https://docs.moodle.org/35/en/Configuration_file

Plugin Details

Severity: Medium

ID: 24874

File Name: moodle_moodledata_info_disclosure.nasl

Version: 1.18

Type: remote

Family: CGI abuses

Published: 3/23/2007

Updated: 6/6/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 4.8

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:moodle:moodle

Required KB Items: www/PHP, installed_sw/Moodle

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2007-1647