CVE-2011-1404

Current Description

Mahara before 1.3.6 does not properly restrict the data in responses to AJAX calls, which allows remote authenticated users to obtain sensitive information via a request associated with (1) blocktype/myfriends/myfriends.json.php, (2) json/usersearch.php, (3) group/membersearchresults.json.php, or (4) json/friendsearch.php, as demonstrated by information about friends and e-mail addresses.

Basic Data

PublishedMay 13, 2011
Last ModifiedAugust 17, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-264
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:S/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationSINGLE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score4.0
SeverityMEDIUM
Exploitability Score8.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationMaharaMahara0.9.0*******
    2.3ApplicationMaharaMahara0.9.1*******
    2.3ApplicationMaharaMahara0.9.2*******
    2.3ApplicationMaharaMahara1.0.0*******
    2.3ApplicationMaharaMahara1.0.1*******
    2.3ApplicationMaharaMahara1.0.2*******
    2.3ApplicationMaharaMahara1.0.3*******
    2.3ApplicationMaharaMahara1.0.4*******
    2.3ApplicationMaharaMahara1.0.5*******
    2.3ApplicationMaharaMahara1.0.6*******
    2.3ApplicationMaharaMahara1.0.7*******
    2.3ApplicationMaharaMahara1.0.8*******
    2.3ApplicationMaharaMahara1.0.9*******
    2.3ApplicationMaharaMahara1.0.10*******
    2.3ApplicationMaharaMahara1.0.11*******
    2.3ApplicationMaharaMahara1.0.12*******
    2.3ApplicationMaharaMahara1.0.13*******
    2.3ApplicationMaharaMahara1.0.14*******
    2.3ApplicationMaharaMahara1.0.15*******
    2.3ApplicationMaharaMahara1.1*******
    2.3ApplicationMaharaMahara1.1.0*******
    2.3ApplicationMaharaMahara1.1.0alpha1******
    2.3ApplicationMaharaMahara1.1.0alpha2******
    2.3ApplicationMaharaMahara1.1.0alpha3******
    2.3ApplicationMaharaMahara1.1.0beta1******
    2.3ApplicationMaharaMahara1.1.0beta2******
    2.3ApplicationMaharaMahara1.1.0beta3******
    2.3ApplicationMaharaMahara1.1.0beta4******
    2.3ApplicationMaharaMahara1.1.0rc1******
    2.3ApplicationMaharaMahara1.1.0rc2******
    2.3ApplicationMaharaMahara1.1.1*******
    2.3ApplicationMaharaMahara1.1.2*******
    2.3ApplicationMaharaMahara1.1.3*******
    2.3ApplicationMaharaMahara1.1.4*******
    2.3ApplicationMaharaMahara1.1.5*******
    2.3ApplicationMaharaMahara1.1.6*******
    2.3ApplicationMaharaMahara1.1.7*******
    2.3ApplicationMaharaMahara1.1.8*******
    2.3ApplicationMaharaMahara1.1.9*******
    2.3ApplicationMaharaMahara1.2.0*******
    2.3ApplicationMaharaMahara1.2.0alpha1******
    2.3ApplicationMaharaMahara1.2.0alpha2******
    2.3ApplicationMaharaMahara1.2.0alpha3******
    2.3ApplicationMaharaMahara1.2.0beta1******
    2.3ApplicationMaharaMahara1.2.0beta2******
    2.3ApplicationMaharaMahara1.2.0beta3******
    2.3ApplicationMaharaMahara1.2.0beta4******
    2.3ApplicationMaharaMahara1.2.0rc1******
    2.3ApplicationMaharaMahara1.2.1*******
    2.3ApplicationMaharaMahara1.2.2*******
    2.3ApplicationMaharaMahara1.2.3*******
    2.3ApplicationMaharaMahara1.2.4*******
    2.3ApplicationMaharaMahara1.2.5*******
    2.3ApplicationMaharaMahara1.2.6*******
    2.3ApplicationMaharaMahara1.3.0*******
    2.3ApplicationMaharaMahara1.3.0beta1******
    2.3ApplicationMaharaMahara1.3.0beta2******
    2.3ApplicationMaharaMahara1.3.0beta3******
    2.3ApplicationMaharaMahara1.3.0beta4******
    2.3ApplicationMaharaMahara1.3.0rc1******
    2.3ApplicationMaharaMahara1.3.1*******
    2.3ApplicationMaharaMahara1.3.2*******
    2.3ApplicationMaharaMahara1.3.3*******
    2.3ApplicationMaharaMahara1.3.4*******
    2.3ApplicationMaharaMahara********1.3.5

Vulnerable Software List

VendorProductVersions
Mahara Mahara *, 0.9.0, 0.9.1, 0.9.2, 1.0.0, 1.0.1, 1.0.10, 1.0.11, 1.0.12, 1.0.13, 1.0.14, 1.0.15, 1.0.2, 1.0.3, 1.0.4, 1.0.5, 1.0.6, 1.0.7, 1.0.8, 1.0.9, 1.1, 1.1.0, 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.1.6, 1.1.7, 1.1.8, 1.1.9, 1.2.0, 1.2.1, 1.2.2, 1.2.3, 1.2.4, 1.2.5, 1.2.6, 1.3.0, 1.3.1, 1.3.2, 1.3.3, 1.3.4

References

NameSourceURLTags
44433http://secunia.com/advisories/44433SECUNIAVendor Advisory
DSA-2246http://www.debian.org/security/2011/dsa-2246DEBIAN
47798http://www.securityfocus.com/bid/47798BID
mahara-viewtasksjson-sec-bypass(67395)https://exchange.xforce.ibmcloud.com/vulnerabilities/67395XF
https://launchpad.net/mahara/+bug/772140https://launchpad.net/mahara/+bug/772140CONFIRMPatch
https://launchpad.net/mahara/+bug/772160https://launchpad.net/mahara/+bug/772160CONFIRMPatch
https://launchpad.net/mahara/+bug/772174https://launchpad.net/mahara/+bug/772174CONFIRMPatch
https://launchpad.net/mahara/+bug/772179https://launchpad.net/mahara/+bug/772179CONFIRMPatch
https://launchpad.net/mahara/+milestone/1.3.6https://launchpad.net/mahara/+milestone/1.3.6CONFIRMPatch