// For flags

CVE-2011-4592

 

Severity Score

5.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The command-line cron implementation in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3 does not properly interact with IP blocking, which might allow remote attackers to bypass intended IP address restrictions by leveraging a configuration in which IP blocking was disabled to restore cron functionality.

La implementación de la crontab por línea de comandos en Moodle v2.0.x antes de v2.0.6 y v2.1.x antes de v2.1.3 no interactua adecuadamente con el bloqueo de IPs, lo que podría permitir a atacantes remotos eludir restricciones de direcciones IP al aprovecharse de una configuración en la que el bloqueo de IP se ha desactivado para restaurar la funcionalidad cron.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2011-11-29 CVE Reserved
  • 2012-07-20 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.0.0
Search vendor "Moodle" for product "Moodle" and version "2.0.0"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.0.1
Search vendor "Moodle" for product "Moodle" and version "2.0.1"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.0.2
Search vendor "Moodle" for product "Moodle" and version "2.0.2"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.0.3
Search vendor "Moodle" for product "Moodle" and version "2.0.3"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.0.4
Search vendor "Moodle" for product "Moodle" and version "2.0.4"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.0.5
Search vendor "Moodle" for product "Moodle" and version "2.0.5"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.1.0
Search vendor "Moodle" for product "Moodle" and version "2.1.0"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.1.1
Search vendor "Moodle" for product "Moodle" and version "2.1.1"
-
Affected
Moodle
Search vendor "Moodle"
Moodle
Search vendor "Moodle" for product "Moodle"
2.1.2
Search vendor "Moodle" for product "Moodle" and version "2.1.2"
-
Affected