CVE-2010-2231
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
28/06/2010
Last modified:
11/04/2025
Description
Cross-site request forgery (CSRF) vulnerability in report/overview/report.php in the quiz module in Moodle before 1.8.13 and 1.9.x before 1.9.9 allows remote attackers to hijack the authentication of arbitrary users for requests that delete quiz attempts via the attemptid parameter.
Impact
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:* | 1.8.12 (including) | |
cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51
- http://docs.moodle.org/en/Moodle_1.8.13_release_notes
- http://docs.moodle.org/en/Moodle_1.9.9_release_notes
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://moodle.org/mod/forum/discuss.php?d=152369
- http://secunia.com/advisories/40248
- http://secunia.com/advisories/40352
- http://tracker.moodle.org/browse/MDL-21688
- http://www.openwall.com/lists/oss-security/2010/06/21/2
- http://www.vupen.com/english/advisories/2010/1530
- http://www.vupen.com/english/advisories/2010/1571
- https://bugzilla.redhat.com/show_bug.cgi?id=605809
- http://cvs.moodle.org/moodle/mod/quiz/report/overview/report.php?r1=1.98.2.50&r2=1.98.2.51
- http://docs.moodle.org/en/Moodle_1.8.13_release_notes
- http://docs.moodle.org/en/Moodle_1.9.9_release_notes
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043285.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043291.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043340.html
- http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
- http://moodle.org/mod/forum/discuss.php?d=152369
- http://secunia.com/advisories/40248
- http://secunia.com/advisories/40352
- http://tracker.moodle.org/browse/MDL-21688
- http://www.openwall.com/lists/oss-security/2010/06/21/2
- http://www.vupen.com/english/advisories/2010/1530
- http://www.vupen.com/english/advisories/2010/1571
- https://bugzilla.redhat.com/show_bug.cgi?id=605809