Description
The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
Published: 2012-07-20
Score: 5.0 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2011-4517 The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T00:09:19.395Z

Reserved: 2011-11-29T00:00:00.000Z

Link: CVE-2011-4592

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-07-20T10:40:36.203

Modified: 2025-04-11T00:51:21.963

Link: CVE-2011-4592

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses