CVE-2013-2083
Published: 25 May 2013
The MoodleQuickForm class in lib/formslib.php in Moodle through 2.1.10, 2.2.x before 2.2.10, 2.3.x before 2.3.7, and 2.4.x before 2.4.4 does not properly handle a certain array-element syntax, which allows remote attackers to bypass intended form-data filtering via a crafted request.
Priority
Status
Package | Release | Status |
---|---|---|
moodle Launchpad, Ubuntu, Debian |
impish |
Does not exist
|
jammy |
Does not exist
|
|
vivid |
Ignored
(end of life)
|
|
kinetic |
Does not exist
|
|
artful |
Ignored
(end of life)
|
|
bionic |
Needed
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Ignored
(end of life)
|
|
eoan |
Ignored
(end of life)
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
lucid |
Ignored
(end of life)
|
|
lunar |
Does not exist
|
|
precise |
Ignored
(end of life)
|
|
quantal |
Ignored
(end of life)
|
|
raring |
Ignored
(end of life)
|
|
saucy |
Ignored
(end of life)
|
|
trusty |
Does not exist
(trusty was needed)
|
|
upstream |
Released
(2.5, 2.4.4, 2.3.7, 2.2.10)
|
|
utopic |
Ignored
(end of life)
|
|
wily |
Ignored
(end of life)
|
|
xenial |
Needed
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
mantic |
Does not exist
|
|
Patches: upstream: http://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=d5909fd1447bc6f05dbf37d7c9eb72b79004e24a (p1) upstream: http://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=a85f745d5088a301edbaca29e58a7e26169842d2 (p2) upstream: http://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=9654f68ae922c24c7270b769cf24917e2c1c1c14 (p3) upstream: http://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=8a9c3f4951e05eea80775d8c82d00a64434376c7 (p4) upstream: http://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=3c0ba94e879702b3c2f20d4cb4f9120a0bfdd9fc (p5) upstream: http://git.moodle.org/gw?p=moodle.git;a=commitdiff;h=48056d54595637fbdbea617a115f85d6a27e5be7 (p6) |