The ip_in_range function in mnet/lib.php in MNET in Moodle 1.9.x before 1.9.15 uses an incorrect data type, which allows remote attackers to bypass intended IP address restrictions via an XMLRPC request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Moodle | Moodle | 1.9.4 | 1.9.4 |
Moodle | Moodle | 1.9.1 | 1.9.1 |
Moodle | Moodle | 1.9.6 | 1.9.6 |
Moodle | Moodle | 1.9.9 | 1.9.9 |
Moodle | Moodle | 1.9.11 | 1.9.11 |
Moodle | Moodle | 1.9.2 | 1.9.2 |
Moodle | Moodle | 1.9.12 | 1.9.12 |
Moodle | Moodle | 1.9.10 | 1.9.10 |
Moodle | Moodle | 1.9.3 | 1.9.3 |
Moodle | Moodle | 1.9.13 | 1.9.13 |
Moodle | Moodle | 1.9.5 | 1.9.5 |
Moodle | Moodle | 1.9.14 | 1.9.14 |
Moodle | Moodle | 1.9.8 | 1.9.8 |
Moodle | Moodle | 1.9.7 | 1.9.7 |
Moodle | Ubuntu | hardy | * |
Moodle | Ubuntu | lucid | * |
Moodle | Ubuntu | maverick | * |
Moodle | Ubuntu | natty | * |
Moodle | Ubuntu | oneiric | * |