Mahara before 1.3.6 allows remote authenticated users to bypass intended access restrictions, and suspend a user account, edit a view, visit a view, edit a plan artefact, read a plans block, read a plan artefact, edit a blog, read a blog block, read a blog artefact, or access a block, via a request associated with (1) admin/users/search.json.php, (2) view/newviewtoken.json.php, (3) lib/mahara.php, (4) artefact/plans/tasks.json.php, (5) artefact/plans/viewtasks.json.php, (6) artefact/blog/view/index.json.php, (7) artefact/blog/posts.json.php, or (8) blocktype/myfriends/myfriends.json.php, related to incorrect privilege enforcement, a missing user id check, and incorrect enforcement of the Overriding Start/Stop Dates setting.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://launchpad.net/mahara/+milestone/1.3.6 | patch |
https://launchpad.net/mahara/+bug/771637 | patch |
https://launchpad.net/mahara/+bug/771623 | patch |
https://launchpad.net/mahara/+bug/771614 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67397 | vdb entry |
https://launchpad.net/mahara/+bug/746182 | patch |
https://launchpad.net/mahara/+bug/771592 | patch |
https://launchpad.net/mahara/+bug/771644 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67396 | vdb entry |
https://launchpad.net/mahara/+bug/772140 | patch |
http://www.securityfocus.com/bid/47798 | vdb entry |
http://secunia.com/advisories/44433 | third party advisory vendor advisory |
https://launchpad.net/mahara/+bug/771653 | patch |
http://www.debian.org/security/2011/dsa-2246 | vendor advisory |