ALT-BU-2021-4372-1
Branch sisyphus_e2k update bulletin.
Package rebar updated to version 3.17.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-13802
Rebar3 versions 3.0.0-beta.3 to 3.13.2 are vulnerable to OS command injection via URL parameter of dependency specification.
- http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html
- https://github.com/vulnbe/poc-rebar3.git
- https://vuln.be/post/rebar3-command-injection/
- http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html
- https://vuln.be/post/rebar3-command-injection/
- https://github.com/vulnbe/poc-rebar3.git
Package erlang updated to version 24.1.2-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-01664
Уязвимость языка программирования Erlang, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2016-1000107
inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- https://bugs.erlang.org/browse/ERL-198
- https://bugs.erlang.org/browse/ERL-198
- https://httpoxy.org/
- https://httpoxy.org/
- https://security-tracker.debian.org/tracker/CVE-2016-1000107
- https://security-tracker.debian.org/tracker/CVE-2016-1000107
Modified: 2024-11-21
CVE-2020-35733
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
- https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
- https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
- https://github.com/erlang/otp/releases
- https://github.com/erlang/otp/releases
- FEDORA-2021-06cbd73fba
- FEDORA-2021-06cbd73fba
- https://www.erlang.org/downloads
- https://www.erlang.org/downloads
- https://www.erlang.org/news
- https://www.erlang.org/news
Package moodle updated to version 3.11.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-06184
Уязвимость системы управления Moodle, связанная с ошибками управления генерации кода, позволяющая нарушителю выполнить произвольный код
BDU:2021-06185
Уязвимость системы управления Moodle, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить привилегии
BDU:2021-06186
Уязвимость системы управления Moodle, связанная с непринятием мер по защите структуры веб-страниц, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2021-06190
Уязвимость функции «delete related badge» системы управления Moodle, связанная с межсайтовыми фольсификациями запросов, позволяющая нарушителю осуществить CSRF-атаку
Modified: 2024-11-21
CVE-2021-3943
A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A remote code execution risk when restoring backup files was identified.
Modified: 2024-11-21
CVE-2021-40691
A session hijack risk was identified in the Shibboleth authentication plugin.
Modified: 2024-11-21
CVE-2021-40692
Insufficient capability checks made it possible for teachers to download users outside of their courses.
Modified: 2024-11-21
CVE-2021-40693
An authentication bypass risk was identified in the external database authentication functionality, due to a type juggling vulnerability.
Modified: 2024-11-21
CVE-2021-40694
Insufficient escaping of the LaTeX preamble made it possible for site administrators to read files available to the HTTP server system account.
Modified: 2024-11-21
CVE-2021-40695
It was possible for a student to view their quiz grade before it had been released, using a quiz web service.
Modified: 2024-11-21
CVE-2021-43558
A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. A URL parameter in the filetype site administrator tool required extra sanitizing to prevent a reflected XSS risk.
Modified: 2024-11-21
CVE-2021-43559
A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. The "delete related badge" functionality did not include the necessary token check to prevent a CSRF risk.
Modified: 2024-11-21
CVE-2021-43560
A flaw was found in Moodle in versions 3.11 to 3.11.3, 3.10 to 3.10.7, 3.9 to 3.9.10 and earlier unsupported versions. Insufficient capability checks made it possible to fetch other users' calendar action events.