Moodle '/calendar/set.php' HTTP Response Splitting Vulnerability
BID:51264
Info
Moodle '/calendar/set.php' HTTP Response Splitting Vulnerability
| Bugtraq ID: | 51264 |
| Class: | Input Validation Error |
| CVE: |
CVE-2011-4203 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 04 2012 12:00AM |
| Updated: | Jan 04 2012 12:00AM |
| Credit: | Mike Evans |
| Vulnerable: |
Moodle Moodle 2.1.2 Moodle Moodle 2.1.1 Moodle Moodle 2.0.5 Moodle Moodle 2.0.4 Moodle Moodle 2.0.3 Moodle Moodle 2.0.2 Moodle Moodle 2.0.1 Moodle Moodle 2.0.1 Moodle Moodle 1.9.14 Moodle Moodle 1.9.13 Moodle Moodle 1.9.12 Moodle Moodle 1.9.11 Moodle Moodle 1.9.10 Moodle Moodle 1.9.9 Moodle Moodle 1.9.8 Moodle Moodle 1.9.7 Moodle moodle 1.9.6 Moodle Moodle 1.9.5 Moodle Moodle 1.9.4 Moodle Moodle 1.9.1 Moodle Moodle 2.2 Moodle Moodle 2.1 Moodle Moodle 1.9.3 Moodle Moodle 1.9.2 |
| Not Vulnerable: |
Moodle Moodle 2.1.3 Moodle Moodle 2.0.6 Moodle Moodle 1.9.15 |
Discussion
Moodle '/calendar/set.php' HTTP Response Splitting Vulnerability
Moodle is prone to an HTTP response-splitting vulnerability because it fails to sufficiently sanitize user-supplied data.
Attackers can leverage this issue to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.
The following versions are vulnerable:
Moodle 1.9.x versions prior to 1.9.15
Moodle 2.0.x versions prior to 2.0.6
Moodle 2.1.x versions prior to 2.1.3
Moodle 2.2
Moodle is prone to an HTTP response-splitting vulnerability because it fails to sufficiently sanitize user-supplied data.
Attackers can leverage this issue to influence or misrepresent how web content is served, cached, or interpreted. This could aid in various attacks that try to entice client users into a false sense of trust.
The following versions are vulnerable:
Moodle 1.9.x versions prior to 1.9.15
Moodle 2.0.x versions prior to 2.0.6
Moodle 2.1.x versions prior to 2.1.3
Moodle 2.2
Exploit / POC
Moodle '/calendar/set.php' HTTP Response Splitting Vulnerability
To exploit this issue an attacker must entice an unsuspecting victim into following a malicious URI.
To exploit this issue an attacker must entice an unsuspecting victim into following a malicious URI.
Solution / Fix
Moodle '/calendar/set.php' HTTP Response Splitting Vulnerability
Solution:
Updates are available. Please see the references for more information.
Solution:
Updates are available. Please see the references for more information.
References
Moodle '/calendar/set.php' HTTP Response Splitting Vulnerability
References:
References:
- CRLF Injection Vulnerability in Moodle (Mike Evans)
- Moodle Homepage (Moodle)