Description
Moodle 1.5.2 and earlier stores sensitive information under the web root with insufficient access control, and provides directory listings, which allows remote attackers to obtain user names, password hashes, and other sensitive information via a direct request for session (sess_*) files in moodledata/sessions/.
Remediation
References
Related Vulnerabilities
WordPress Plugin Anti-Malware Security and Brute-Force Firewall Cross-Site Scripting (4.15.22)
WordPress Plugin Notices Ticker Cross-Site Scripting (6.1)
WordPress Plugin Cherry Services List Information Disclosure (1.4.1)
phpMyFAQ Cleartext Transmission of Sensitive Information Vulnerability (CVE-2022-4409)
WordPress Plugin Visitor Traffic Real Time Statistics Unspecified Vulnerability (2.13)