Information Exposure Affecting moodle package, versions <3.0.3+dfsg-0ubuntu1


Severity

Recommended
low

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.18% (55th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1604-MOODLE-362277
  • published22 May 2016
  • disclosed22 May 2016

Introduced: 22 May 2016

CVE-2016-2158  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Ubuntu:16.04 moodle to version 3.0.3+dfsg-0ubuntu1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream moodle package and not the moodle package as distributed by Ubuntu. See How to fix? for Ubuntu:16.04 relevant fixed versions and status.

lib/ajax/getnavbranch.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3, when the forcelogin feature is enabled, allows remote attackers to obtain sensitive category-detail information from the navigation branch by leveraging the guest role for an Ajax request.