Moodle 2.7.x < 2.7.16 Authentication Bypass

low Nessus Network Monitor Plugin ID 9831

Synopsis

The remote web server is hosting a web application that is vulnerable to an authentication bypass attack vector.

Description

The remote web server hosts Moodle, an open-source course management system. Versions of Moodle 2.7.x prior to 2.7.16 are affected by a flaw that is due to the program failing to invalidate user tokens after a password change is performed. This may allow an attacker who had compromised a user's account to have their access persist after the password has been changed.

Solution

Upgrade to Moodle version 2.7.16 or later.

See Also

https://docs.moodle.org/dev/Moodle_2.7.16_release_notes

Plugin Details

Severity: Low

ID: 9831

Family: CGI

Published: 12/16/2016

Updated: 3/6/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:moodle:moodle

Patch Publication Date: 9/12/2016

Vulnerability Publication Date: 9/12/2016

Reference Information

CVE: CVE-2016-7038

BID: 93174