Open mend-bolt-for-github[bot] opened 7 months ago
Moodle - the world's open source learning platform
Dependency Hierarchy: - :x: **moodle/moodle-v2.6.2** (Vulnerable Library)
Found in HEAD commit: 27e1f740a162e55490d9ca929f243afbaa92476c
Found in base branch: master
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
Publish Date: 2021-03-15
URL: CVE-2021-20281
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
Type: Upgrade version
Origin: https://moodle.org/mod/forum/discuss.php?d=419652
Release Date: 2021-03-15
Fix Resolution: v3.5.17,v3.8.8,v3.9.5,v3.10.2
Step up your Open Source Security Game with Mend here
CVE-2021-20281 - Medium Severity Vulnerability
Vulnerable Library - moodle/moodle-v2.6.2
Moodle - the world's open source learning platform
Dependency Hierarchy: - :x: **moodle/moodle-v2.6.2** (Vulnerable Library)
Found in HEAD commit: 27e1f740a162e55490d9ca929f243afbaa92476c
Found in base branch: master
Vulnerability Details
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
Publish Date: 2021-03-15
URL: CVE-2021-20281
CVSS 3 Score Details (5.3)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://moodle.org/mod/forum/discuss.php?d=419652
Release Date: 2021-03-15
Fix Resolution: v3.5.17,v3.8.8,v3.9.5,v3.10.2
Step up your Open Source Security Game with Mend here