ALT-BU-2022-5938-2
Branch p10 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-24300
Minetest before 5.4.0 allows attackers to add or modify arbitrary meta fields of the same item stack as saved user input, aka ItemStack meta injection.
- https://bugs.debian.org/1004223
- https://bugs.debian.org/1004223
- https://github.com/minetest/minetest/commit/b5956bde259faa240a81060ff4e598e25ad52dae
- https://github.com/minetest/minetest/commit/b5956bde259faa240a81060ff4e598e25ad52dae
- https://github.com/minetest/minetest/security/advisories/GHSA-hwj2-xf72-r4cf
- https://github.com/minetest/minetest/security/advisories/GHSA-hwj2-xf72-r4cf
- DSA-5075
- DSA-5075
Modified: 2024-11-21
CVE-2022-24301
In Minetest before 5.4.0, players can add or subtract items from a different player's inventory.
- https://github.com/minetest/minetest/commit/3693b6871eba268ecc79b3f52d00d3cefe761131
- https://github.com/minetest/minetest/commit/3693b6871eba268ecc79b3f52d00d3cefe761131
- https://github.com/minetest/minetest/security/advisories/GHSA-fvwv-qcq6-wmp5
- https://github.com/minetest/minetest/security/advisories/GHSA-fvwv-qcq6-wmp5
- DSA-5075
- DSA-5075
Modified: 2024-11-21
CVE-2022-35978
Minetest is a free open-source voxel game engine with easy modding and game creation. In **single player**, a mod can set a global setting that controls the Lua script loaded to display the main menu. The script is then loaded as soon as the game session is exited. The Lua environment the menu runs in is not sandboxed and can directly interfere with the user's system. There are currently no known workarounds.
- https://dev.minetest.net/Changelog#5.5.0_.E2.86.92_5.6.0
- https://dev.minetest.net/Changelog#5.5.0_.E2.86.92_5.6.0
- https://github.com/minetest/minetest/commit/da71e86633d0b27cd02d7aac9fdac625d141ca13
- https://github.com/minetest/minetest/commit/da71e86633d0b27cd02d7aac9fdac625d141ca13
- https://github.com/minetest/minetest/security/advisories/GHSA-663q-pcjw-27cc
- https://github.com/minetest/minetest/security/advisories/GHSA-663q-pcjw-27cc
Closed bugs
Minetest - дублированные иконки
ERROR[Main]: Game specified in default_game [minetest] is invalid.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-42612
A use after free in cleanup_index in index.c in Halibut 1.2 allows an attacker to cause a segmentation fault or possibly have other unspecified impact via a crafted text document.
Modified: 2024-11-21
CVE-2021-42613
A double free in cleanup_index in index.c in Halibut 1.2 allows an attacker to cause a denial of service or possibly have other unspecified impact via a crafted text document.
Modified: 2024-11-21
CVE-2021-42614
A use after free in info_width_internal in bk_info.c in Halibut 1.2 allows an attacker to cause a segmentation fault or possibly have unspecified other impact via a crafted text document.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-46828
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
- http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=86529758570cef4c73fb9b9c4104fdc510f701ed
- http://git.linux-nfs.org/?p=steved/libtirpc.git%3Ba=commit%3Bh=86529758570cef4c73fb9b9c4104fdc510f701ed
- [debian-lts-announce] 20220812 [SECURITY] [DLA 3071-1] libtirpc security update
- [debian-lts-announce] 20220812 [SECURITY] [DLA 3071-1] libtirpc security update
- GLSA-202210-33
- GLSA-202210-33
- https://security.netapp.com/advisory/ntap-20221007-0004/
- https://security.netapp.com/advisory/ntap-20221007-0004/
- DSA-5200
- DSA-5200
Closed vulnerabilities
BDU:2021-04420
Уязвимость библиотеки протоколов SPF libspf2, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-20314
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- FEDORA-2021-aa8637c985
- FEDORA-2021-aa8637c985
- FEDORA-2021-994751581f
- FEDORA-2021-994751581f
- FEDORA-2021-044be3d54e
- FEDORA-2021-044be3d54e
- https://security.gentoo.org/glsa/202401-22
- https://security.gentoo.org/glsa/202401-22
Modified: 2024-11-21
CVE-2021-33912
libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- GLSA-202401-22
- GLSA-202401-22
Modified: 2024-11-21
CVE-2021-33913
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- GLSA-202401-22
- GLSA-202401-22
Package python3-module-lmdb updated to version 1.3.0-alt1 for branch p10 in task 305504.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-16224
An issue was discovered in py-lmdb 0.97. For certain values of md_flags, mdb_node_add does not properly set up a memcpy destination, leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
Modified: 2024-11-21
CVE-2019-16225
An issue was discovered in py-lmdb 0.97. For certain values of mp_flags, mdb_page_touch does not properly set up mc->mc_pg[mc->top], leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
Modified: 2024-11-21
CVE-2019-16226
An issue was discovered in py-lmdb 0.97. mdb_node_del does not validate a memmove in the case of an unexpected node->mn_hi, leading to an invalid write operation. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
Modified: 2024-11-21
CVE-2019-16227
An issue was discovered in py-lmdb 0.97. For certain values of mn_flags, mdb_cursor_set triggers a memcpy with an invalid write operation within mdb_xcursor_init1. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
Modified: 2024-11-21
CVE-2019-16228
An issue was discovered in py-lmdb 0.97. There is a divide-by-zero error in the function mdb_env_open2 if mdb_env_read_header obtains a zero value for a certain size field. NOTE: this outcome occurs when accessing a data.mdb file supplied by an attacker.
Package gem-addressable updated to version 2.8.0-alt1 for branch p10 in task 305517.
Closed vulnerabilities
BDU:2021-04454
Уязвимость библиотеки Addressable, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-32740
Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists after version 2.3.0 through version 2.7.0. Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched in version 2.8.0. As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.
- https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc
- https://github.com/sporkmonger/addressable/commit/0d8a3127e35886ce9284810a7f2438bff6b43cbc
- https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g
- https://github.com/sporkmonger/addressable/security/advisories/GHSA-jxhc-q857-3j6g
- FEDORA-2021-e9fc035565
- FEDORA-2021-e9fc035565
- FEDORA-2021-5d14763df8
- FEDORA-2021-5d14763df8
Package LibreOffice-still updated to version 7.3.5.2-alt1 for branch p10 in task 305760.
Closed vulnerabilities
BDU:2022-04770
Уязвимость пакета офисных программ LibreOffice, связанная с недостаточно стойким шифрованием данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04771
Уязвимость пакета офисных программ LibreOffice, связанная с неправильным подтверждением подлинности сертификата, позволяющая нарушителю выполнить произвольный код
BDU:2022-04785
Уязвимость базы данных конфигураций пользователя пакета офисных программ LibreOffice, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2022-26305
An Improper Certificate Validation vulnerability in LibreOffice existed where determining if a macro was signed by a trusted author was done by only matching the serial number and issuer string of the used certificate with that of a trusted certificate. This is not sufficient to verify that the macro was actually signed with the certificate. An adversary could therefore create an arbitrary certificate with a serial number and an issuer string identical to a trusted certificate which LibreOffice would present as belonging to the trusted author, potentially leading to the user to execute arbitrary code contained in macros improperly trusted. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/cve-2022-26305
- https://www.libreoffice.org/about-us/security/advisories/cve-2022-26305
Modified: 2024-11-21
CVE-2022-26306
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where the required initialization vector for encryption was always the same which weakens the security of the encryption making them vulnerable if an attacker has access to the user's configuration data. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.1.
- [oss-security] 20220812 CVE-2022-37400: Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password
- [oss-security] 20220812 CVE-2022-37400: Apache OpenOffice Static Initialization Vector Allows to Recover Passwords for Web Connections Without Knowing the Master Password
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306
- https://www.libreoffice.org/about-us/security/advisories/cve-2022-26306
Modified: 2024-11-21
CVE-2022-26307
LibreOffice supports the storage of passwords for web connections in the user’s configuration database. The stored passwords are encrypted with a single master key provided by the user. A flaw in LibreOffice existed where master key was poorly encoded resulting in weakening its entropy from 128 to 43 bits making the stored passwords vulerable to a brute force attack if an attacker has access to the users stored config. This issue affects: The Document Foundation LibreOffice 7.2 versions prior to 7.2.7; 7.3 versions prior to 7.3.3.
- [oss-security] 20220812 CVE-2022-37401: Apache OpenOffice Weak Master Keys
- [oss-security] 20220812 CVE-2022-37401: Apache OpenOffice Weak Master Keys
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/cve-2022-26307
- https://www.libreoffice.org/about-us/security/advisories/cve-2022-26307
Closed vulnerabilities
BDU:2022-03176
Уязвимость виртуальной обучающей среды Moodle, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки
BDU:2022-03179
Уязвимость реализации конфигурации moodle/badges:configurecriteria виртуальной обучающей среды Moodle, позволяющая нарушителю выполнить произвольный SQL-код
BDU:2022-03182
Уязвимость реализации класса core_auth виртуальной обучающей среды Moodle, позволяющая нарушителю обойти ограничения безопасности
BDU:2022-03183
Уязвимость реализации класса core_user виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03231
Уязвимость реализации класса core_search виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-04906
Уязвимость виртуальной обучающей среды moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию
BDU:2022-04907
Уязвимость реализации функции автоматического входа в систему с мобильных устройств виртуальной обучающей среды Moodle, позволяющая нарушителю провести фишинговую атаку и раскрыть защищаемую информацию
BDU:2022-04908
Уязвимость модуля LTI виртуальной обучающей среды Moodle, позволяющая нарушителю проводить фишинговые атаки или раскрыть защищаемую информацию
BDU:2022-06403
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-06405
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной проверкой входных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2022-30596
A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204
- https://bugzilla.redhat.com/show_bug.cgi?id=2083583
- https://bugzilla.redhat.com/show_bug.cgi?id=2083583
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434578
- https://moodle.org/mod/forum/discuss.php?d=434578
Modified: 2024-11-21
CVE-2022-30597
A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74318
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74318
- https://bugzilla.redhat.com/show_bug.cgi?id=2083585
- https://bugzilla.redhat.com/show_bug.cgi?id=2083585
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434579
- https://moodle.org/mod/forum/discuss.php?d=434579
Modified: 2024-11-21
CVE-2022-30598
A flaw was found in moodle where global search results could include author information on some activities where a user may not otherwise have access to it.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71623
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71623
- https://bugzilla.redhat.com/show_bug.cgi?id=2083592
- https://bugzilla.redhat.com/show_bug.cgi?id=2083592
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434580
- https://moodle.org/mod/forum/discuss.php?d=434580
Modified: 2024-11-21
CVE-2022-30599
A flaw was found in moodle where an SQL injection risk was identified in Badges code relating to configuring criteria.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74333
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74333
- https://bugzilla.redhat.com/show_bug.cgi?id=2083610
- https://bugzilla.redhat.com/show_bug.cgi?id=2083610
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434581
- https://moodle.org/mod/forum/discuss.php?d=434581
Modified: 2024-11-21
CVE-2022-30600
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-73736
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-73736
- https://bugzilla.redhat.com/show_bug.cgi?id=2083613
- https://bugzilla.redhat.com/show_bug.cgi?id=2083613
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434582
- https://moodle.org/mod/forum/discuss.php?d=434582
Modified: 2024-11-21
CVE-2022-35649
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044
- https://bugzilla.redhat.com/show_bug.cgi?id=2106273
- https://bugzilla.redhat.com/show_bug.cgi?id=2106273
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436456
- https://moodle.org/mod/forum/discuss.php?d=436456
Modified: 2024-11-21
CVE-2022-35650
The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029
- https://bugzilla.redhat.com/show_bug.cgi?id=2106274
- https://bugzilla.redhat.com/show_bug.cgi?id=2106274
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436457
- https://moodle.org/mod/forum/discuss.php?d=436457
Modified: 2024-11-21
CVE-2022-35651
A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921
- https://bugzilla.redhat.com/show_bug.cgi?id=2106275
- https://bugzilla.redhat.com/show_bug.cgi?id=2106275
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436458
- https://moodle.org/mod/forum/discuss.php?d=436458
Modified: 2024-11-21
CVE-2022-35652
An open redirect issue was found in Moodle due to improper sanitization of user-supplied data in mobile auto-login feature. A remote attacker can create a link that leads to a trusted website, however, when clicked, it redirects the victims to arbitrary URL/domain. Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72171
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72171
- https://bugzilla.redhat.com/show_bug.cgi?id=2106276
- https://bugzilla.redhat.com/show_bug.cgi?id=2106276
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436459
- https://moodle.org/mod/forum/discuss.php?d=436459
Modified: 2024-11-21
CVE-2022-35653
A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72299
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72299
- https://bugzilla.redhat.com/show_bug.cgi?id=2106277
- https://bugzilla.redhat.com/show_bug.cgi?id=2106277
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436460
- https://moodle.org/mod/forum/discuss.php?d=436460
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-4297
A vulnerability has been found in trampgeek jobe up to 1.6.4 and classified as problematic. This vulnerability affects the function runs_post of the file application/controllers/Restapi.php. The manipulation of the argument sourcefilename leads to an unknown weakness. Upgrading to version 1.6.5 is able to address this issue. The patch is identified as 694da5013dbecc8d30dd83e2a83e78faadf93771. It is recommended to upgrade the affected component. VDB-217174 is the identifier assigned to this vulnerability.
- https://github.com/trampgeek/jobe/commit/694da5013dbecc8d30dd83e2a83e78faadf93771
- https://github.com/trampgeek/jobe/commit/694da5013dbecc8d30dd83e2a83e78faadf93771
- https://github.com/trampgeek/jobe/issues/46
- https://github.com/trampgeek/jobe/issues/46
- https://vuldb.com/?ctiid.217174
- https://vuldb.com/?ctiid.217174
- https://vuldb.com/?id.217174
- https://vuldb.com/?id.217174
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-41233
Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.
Modified: 2024-11-21
CVE-2021-41239
Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx
- https://github.com/nextcloud/server/issues/27122
- https://github.com/nextcloud/server/issues/27122
- https://github.com/nextcloud/server/pull/29260
- https://github.com/nextcloud/server/pull/29260
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-41241
Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.
- https://github.com/nextcloud/groupfolders/issues/1692
- https://github.com/nextcloud/groupfolders/issues/1692
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94
- https://github.com/nextcloud/server/pull/29362
- https://github.com/nextcloud/server/pull/29362
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-24741
Nextcloud server is an open source, self hosted cloud style services platform. In affected versions an attacker can cause a denial of service by uploading specially crafted files which will cause the server to allocate too much memory / CPU. It is recommended that the Nextcloud Server is upgraded to 21.0.8 , 22.2.4 or 23.0.1. Users unable to upgrade should disable preview generation with the `'enable_previews'` config flag.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89
- https://github.com/nextcloud/server/pull/30291
- https://github.com/nextcloud/server/pull/30291
- https://hackerone.com/reports/1261225
- https://hackerone.com/reports/1261225
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-24888
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp
- https://github.com/nextcloud/server/pull/29895
- https://github.com/nextcloud/server/pull/29895
- https://hackerone.com/reports/1402249
- https://hackerone.com/reports/1402249
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-24889
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6
- https://github.com/nextcloud/server/pull/30615
- https://github.com/nextcloud/server/pull/30615
- https://hackerone.com/reports/1403614
- https://hackerone.com/reports/1403614
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-29163
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds.
- https://github.com/nextcloud/circles/pull/866
- https://github.com/nextcloud/circles/pull/866
- https://github.com/nextcloud/circles/pull/926
- https://github.com/nextcloud/circles/pull/926
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx
- https://hackerone.com/reports/1406926
- https://hackerone.com/reports/1406926
Modified: 2024-11-21
CVE-2022-29243
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w
- https://github.com/nextcloud/server/pull/31658
- https://github.com/nextcloud/server/pull/31658
- https://hackerone.com/reports/1153138
- https://hackerone.com/reports/1153138
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-31014
Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. It is recommended that the Nextcloud Server is upgraded to 22.2.8 , 23.0.5 or 24.0.1. There are no known workarounds for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2
- https://github.com/nextcloud/server/pull/32428
- https://github.com/nextcloud/server/pull/32428
- https://hackerone.com/reports/1516377
- https://hackerone.com/reports/1516377
Modified: 2024-11-21
CVE-2022-31118
Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq
- https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018
- https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018
Modified: 2024-11-21
CVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x
- https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655
- https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655
- https://portal.nextcloud.com/article/using-the-audit-log-44.html
- https://portal.nextcloud.com/article/using-the-audit-log-44.html
Modified: 2024-11-21
CVE-2022-36074
Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
Modified: 2024-11-21
CVE-2022-39211
Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8
- https://github.com/nextcloud/server/pull/32988
- https://github.com/nextcloud/server/pull/32988
- https://github.com/nextcloud/server/pull/33031
- https://github.com/nextcloud/server/pull/33031
Modified: 2024-11-21
CVE-2022-39346
Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6
- https://github.com/nextcloud/server/pull/33052
- https://github.com/nextcloud/server/pull/33052
- https://hackerone.com/reports/1588562
- https://hackerone.com/reports/1588562
- FEDORA-2022-902df3b060
- FEDORA-2022-902df3b060
- FEDORA-2022-98c1d712b5
- FEDORA-2022-98c1d712b5
- FEDORA-2022-49b20342c0
- FEDORA-2022-49b20342c0