The ip_in_range function in mnet/lib.php in MNET in Moodle 1.9.x before 1.9.15 uses an incorrect data type, which allows remote attackers to bypass intended IP address restrictions via an XMLRPC request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Moodle | Moodle | 1.9.1 (including) | 1.9.1 (including) |
Moodle | Moodle | 1.9.2 (including) | 1.9.2 (including) |
Moodle | Moodle | 1.9.3 (including) | 1.9.3 (including) |
Moodle | Moodle | 1.9.4 (including) | 1.9.4 (including) |
Moodle | Moodle | 1.9.5 (including) | 1.9.5 (including) |
Moodle | Moodle | 1.9.6 (including) | 1.9.6 (including) |
Moodle | Moodle | 1.9.7 (including) | 1.9.7 (including) |
Moodle | Moodle | 1.9.8 (including) | 1.9.8 (including) |
Moodle | Moodle | 1.9.9 (including) | 1.9.9 (including) |
Moodle | Moodle | 1.9.10 (including) | 1.9.10 (including) |
Moodle | Moodle | 1.9.11 (including) | 1.9.11 (including) |
Moodle | Moodle | 1.9.12 (including) | 1.9.12 (including) |
Moodle | Moodle | 1.9.13 (including) | 1.9.13 (including) |
Moodle | Moodle | 1.9.14 (including) | 1.9.14 (including) |
Moodle | Ubuntu | hardy | * |
Moodle | Ubuntu | lucid | * |
Moodle | Ubuntu | maverick | * |
Moodle | Ubuntu | natty | * |
Moodle | Ubuntu | oneiric | * |