CVE-2011-1402

Current Description

Mahara before 1.3.6 allows remote authenticated users to bypass intended access restrictions, and suspend a user account, edit a view, visit a view, edit a plan artefact, read a plans block, read a plan artefact, edit a blog, read a blog block, read a blog artefact, or access a block, via a request associated with (1) admin/users/search.json.php, (2) view/newviewtoken.json.php, (3) lib/mahara.php, (4) artefact/plans/tasks.json.php, (5) artefact/plans/viewtasks.json.php, (6) artefact/blog/view/index.json.php, (7) artefact/blog/posts.json.php, or (8) blocktype/myfriends/myfriends.json.php, related to incorrect privilege enforcement, a missing user id check, and incorrect enforcement of the Overriding Start/Stop Dates setting.

Basic Data

PublishedMay 13, 2011
Last ModifiedAugust 17, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:S/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationSINGLE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.5
SeverityMEDIUM
Exploitability Score8.0
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMaharaMahara0.9.0*******
    2.3ApplicationMaharaMahara0.9.1*******
    2.3ApplicationMaharaMahara0.9.2*******
    2.3ApplicationMaharaMahara1.0.0*******
    2.3ApplicationMaharaMahara1.0.1*******
    2.3ApplicationMaharaMahara1.0.2*******
    2.3ApplicationMaharaMahara1.0.3*******
    2.3ApplicationMaharaMahara1.0.4*******
    2.3ApplicationMaharaMahara1.0.5*******
    2.3ApplicationMaharaMahara1.0.6*******
    2.3ApplicationMaharaMahara1.0.7*******
    2.3ApplicationMaharaMahara1.0.8*******
    2.3ApplicationMaharaMahara1.0.9*******
    2.3ApplicationMaharaMahara1.0.10*******
    2.3ApplicationMaharaMahara1.0.11*******
    2.3ApplicationMaharaMahara1.0.12*******
    2.3ApplicationMaharaMahara1.0.13*******
    2.3ApplicationMaharaMahara1.0.14*******
    2.3ApplicationMaharaMahara1.0.15*******
    2.3ApplicationMaharaMahara1.1*******
    2.3ApplicationMaharaMahara1.1.0*******
    2.3ApplicationMaharaMahara1.1.0alpha1******
    2.3ApplicationMaharaMahara1.1.0alpha2******
    2.3ApplicationMaharaMahara1.1.0alpha3******
    2.3ApplicationMaharaMahara1.1.0beta1******
    2.3ApplicationMaharaMahara1.1.0beta2******
    2.3ApplicationMaharaMahara1.1.0beta3******
    2.3ApplicationMaharaMahara1.1.0beta4******
    2.3ApplicationMaharaMahara1.1.0rc1******
    2.3ApplicationMaharaMahara1.1.0rc2******
    2.3ApplicationMaharaMahara1.1.1*******
    2.3ApplicationMaharaMahara1.1.2*******
    2.3ApplicationMaharaMahara1.1.3*******
    2.3ApplicationMaharaMahara1.1.4*******
    2.3ApplicationMaharaMahara1.1.5*******
    2.3ApplicationMaharaMahara1.1.6*******
    2.3ApplicationMaharaMahara1.1.7*******
    2.3ApplicationMaharaMahara1.1.8*******
    2.3ApplicationMaharaMahara1.1.9*******
    2.3ApplicationMaharaMahara1.2.0*******
    2.3ApplicationMaharaMahara1.2.0alpha1******
    2.3ApplicationMaharaMahara1.2.0alpha2******
    2.3ApplicationMaharaMahara1.2.0alpha3******
    2.3ApplicationMaharaMahara1.2.0beta1******
    2.3ApplicationMaharaMahara1.2.0beta2******
    2.3ApplicationMaharaMahara1.2.0beta3******
    2.3ApplicationMaharaMahara1.2.0beta4******
    2.3ApplicationMaharaMahara1.2.0rc1******
    2.3ApplicationMaharaMahara1.2.1*******
    2.3ApplicationMaharaMahara1.2.2*******
    2.3ApplicationMaharaMahara1.2.3*******
    2.3ApplicationMaharaMahara1.2.4*******
    2.3ApplicationMaharaMahara1.2.5*******
    2.3ApplicationMaharaMahara1.2.6*******
    2.3ApplicationMaharaMahara1.3.0*******
    2.3ApplicationMaharaMahara1.3.0beta1******
    2.3ApplicationMaharaMahara1.3.0beta2******
    2.3ApplicationMaharaMahara1.3.0beta3******
    2.3ApplicationMaharaMahara1.3.0beta4******
    2.3ApplicationMaharaMahara1.3.0rc1******
    2.3ApplicationMaharaMahara1.3.1*******
    2.3ApplicationMaharaMahara1.3.2*******
    2.3ApplicationMaharaMahara1.3.3*******
    2.3ApplicationMaharaMahara1.3.4*******
    2.3ApplicationMaharaMahara********1.3.5

Vulnerable Software List

VendorProductVersions
Mahara Mahara *, 0.9.0, 0.9.1, 0.9.2, 1.0.0, 1.0.1, 1.0.10, 1.0.11, 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.0.9, 1.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4

References

NameSourceURLTags
44433http://secunia.com/advisories/44433SECUNIAVendor Advisory
DSA-2246http://www.debian.org/security/2011/dsa-2246DEBIAN
47798http://www.securityfocus.com/bid/47798BID
mahara-newviewtokenjson-sec-bypass(67396)https://exchange.xforce.ibmcloud.com/vulnerabilities/67396XF
mahara-searchjson-sec-bypass(67397)https://exchange.xforce.ibmcloud.com/vulnerabilities/67397XF
https://launchpad.net/mahara/+bug/746182https://launchpad.net/mahara/+bug/746182CONFIRMPatch
https://launchpad.net/mahara/+bug/771592https://launchpad.net/mahara/+bug/771592CONFIRMPatch
https://launchpad.net/mahara/+bug/771614https://launchpad.net/mahara/+bug/771614CONFIRMPatch
https://launchpad.net/mahara/+bug/771623https://launchpad.net/mahara/+bug/771623CONFIRMPatch
https://launchpad.net/mahara/+bug/771637https://launchpad.net/mahara/+bug/771637CONFIRMPatch
https://launchpad.net/mahara/+bug/771644https://launchpad.net/mahara/+bug/771644CONFIRMPatch
https://launchpad.net/mahara/+bug/771653https://launchpad.net/mahara/+bug/771653CONFIRMPatch
https://launchpad.net/mahara/+bug/772140https://launchpad.net/mahara/+bug/772140CONFIRMPatch
https://launchpad.net/mahara/+milestone/1.3.6https://launchpad.net/mahara/+milestone/1.3.6CONFIRMPatch