ALT-BU-2023-5170-2
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2023-01654
Уязвимость демона usbguard-dbus программного обеспечения защиты USB устройств USBGuard, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-25058
An issue was discovered in USBGuard before 1.1.0. On systems with the usbguard-dbus daemon running, an unprivileged user could make USBGuard allow all USB devices to be connected in the future.
- https://github.com/USBGuard/usbguard/issues/273
- https://github.com/USBGuard/usbguard/issues/273
- https://github.com/USBGuard/usbguard/issues/403
- https://github.com/USBGuard/usbguard/issues/403
- https://github.com/USBGuard/usbguard/pull/531
- https://github.com/USBGuard/usbguard/pull/531
- [debian-lts-announce] 20220411 [SECURITY] [DLA 2979-1] usbguard security update
- [debian-lts-announce] 20220411 [SECURITY] [DLA 2979-1] usbguard security update
- FEDORA-2022-0b97f87195
- FEDORA-2022-0b97f87195
- FEDORA-2022-668038c1da
- FEDORA-2022-668038c1da
- FEDORA-2022-1f97de95ba
- FEDORA-2022-1f97de95ba
Closed vulnerabilities
BDU:2022-04829
Уязвимость функции host_name_lookup (host.c) почтового сервера Exim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04830
Уязвимость функции pam_converse (auths/call_pam.c) почтового сервера Exim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-01672
Уязвимость функционала STARTTLS почтового сервера Exim, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-38371
The STARTTLS feature in Exim through 4.94.2 allows response injection (buffering) during MTA SMTP sending.
Modified: 2024-11-21
CVE-2022-37451
Exim before 4.96 has an invalid free in pam_converse in auths/call_pam.c because store_free is not used after store_malloc.
- https://cwe.mitre.org/data/definitions/762.html
- https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42
- https://github.com/Exim/exim/compare/exim-4.95...exim-4.96
- https://github.com/Exim/exim/wiki/EximSecurity
- https://github.com/ivd38/exim_invalid_free
- https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html
- FEDORA-2022-1ca1d22165
- FEDORA-2022-f9a8388e62
- https://www.exim.org/static/doc/security/
- https://www.openwall.com/lists/oss-security/2022/08/06/1
- https://cwe.mitre.org/data/definitions/762.html
- https://www.openwall.com/lists/oss-security/2022/08/06/1
- https://www.exim.org/static/doc/security/
- FEDORA-2022-f9a8388e62
- FEDORA-2022-1ca1d22165
- https://lists.exim.org/lurker/message/20220625.141825.d6de6074.en.html
- https://github.com/ivd38/exim_invalid_free
- https://github.com/Exim/exim/wiki/EximSecurity
- https://github.com/Exim/exim/compare/exim-4.95...exim-4.96
- https://github.com/Exim/exim/commit/51be321b27825c01829dffd90f11bfff256f7e42
Modified: 2024-11-21
CVE-2022-37452
Exim before 4.95 has a heap-based buffer overflow for the alias list in host_name_lookup in host.c when sender_host_name is set.
- https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743
- https://github.com/Exim/exim/compare/exim-4.94...exim-4.95
- https://github.com/Exim/exim/wiki/EximSecurity
- https://github.com/ivd38/exim_overflow
- [debian-lts-announce] 20220827 [SECURITY] [DLA 3082-1] exim4 security update
- https://www.exim.org/static/doc/security/
- https://www.openwall.com/lists/oss-security/2022/08/06/8
- https://github.com/Exim/exim/commit/d4bc023436e4cce7c23c5f8bb5199e178b4cc743
- https://www.openwall.com/lists/oss-security/2022/08/06/8
- https://www.exim.org/static/doc/security/
- [debian-lts-announce] 20220827 [SECURITY] [DLA 3082-1] exim4 security update
- https://github.com/ivd38/exim_overflow
- https://github.com/Exim/exim/wiki/EximSecurity
- https://github.com/Exim/exim/compare/exim-4.94...exim-4.95
Closed vulnerabilities
BDU:2023-03380
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной авторизацией, позволяющая нарушителю повышать привилегии внутри приложения
BDU:2023-03381
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильным управлением привилегиями, позволяющая нарушителю повышать привилегии внутри приложения
BDU:2023-03382
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с подделкой запроса на стороне сервера, позволяющая нарушителю выполнять SSRF-атаки
BDU:2023-03385
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией ввода во время генерации веб-страницы, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных.
BDU:2023-03387
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией специальных элементов, используемых в команде SQL, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных
BDU:2023-03388
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией входных данных во время генерации веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев
BDU:2023-03389
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией ввода во время генерации веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев
Modified: 2024-11-21
CVE-2023-28632
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the "forgotten password" feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to `Forgotten password?` event. However, it will not prevent unauthorized modification of any user emails.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28633
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
- https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf
- https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
Modified: 2024-11-21
CVE-2023-28634
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28636
GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28639
GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28838
GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28852
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to versions 9.5.13 and 10.0.7, a user with dashboard administration rights may hack the dashboard form to store malicious code that will be executed when other users will use the related dashboard. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-1253
Heap-based Buffer Overflow in GitHub repository strukturag/libde265 prior to and including 1.0.8. The fix is established in commit 8e89fe0e175d2870c39486fdd09250b230ec10b8 but does not yet belong to an official release.
- https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8
- https://github.com/strukturag/libde265/commit/8e89fe0e175d2870c39486fdd09250b230ec10b8
- https://huntr.dev/bounties/1-other-strukturag/libde265
- https://huntr.dev/bounties/1-other-strukturag/libde265
- DSA-5346
- DSA-5346
Closed vulnerabilities
BDU:2022-06359
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной очисткой пользовательских данных, позволяющая нарушителю выполнить произвольные SQL-команды
BDU:2022-06382
Уязвимость плагина H5P виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-06383
Уязвимость виртуальной обучающей среды Moodle, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-06402
Уязвимость реализации функции рекурсивного рендеринга компонента Mustache helpers системы шаблонов Mustache template system виртуальной обучающей среды Moodle, позволяющая нарушителю проводить межсайтовые сценарные атаки или вызвать отказ в обслуживании
BDU:2022-07405
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой источника HTTP-запроса в URL-адресе перенаправления курса, позволяющая нарушителю выполнять атаки с подделкой межсайтовых запросов
BDU:2022-07406
Уязвимость системы управления курсами Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)
BDU:2022-07407
Уязвимость системы управления курсами Moodle, связанная с недостаточной очисткой пользовательских данных в нескольких «социальных» полях профиля пользователя, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)
BDU:2022-07408
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой введенных пользователем данных в библиотеке поставщика LTI, позволяющая нарушителю выполнять SSRF-атаки
BDU:2023-03462
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к ограниченным функциям
BDU:2023-03478
Уязвимость виртуальной обучающей среды Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
BDU:2023-03480
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной очисткой данных, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных
Modified: 2024-11-21
CVE-2021-23414
This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
- https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2
- https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587
- https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429
- https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429
Modified: 2024-11-21
CVE-2022-0323
Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.
- https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e
- https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e
- https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7
- https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7
Modified: 2024-11-21
CVE-2022-2986
Enabling and disabling installed H5P libraries did not include the necessary token to prevent a CSRF risk.
Modified: 2025-02-20
CVE-2022-40208
In Moodle, insufficient limitations in some quiz web services made it possible for students to bypass sequential navigation during a quiz attempt.
Modified: 2024-11-21
CVE-2022-40313
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
Modified: 2024-11-21
CVE-2022-40314
A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified.
Modified: 2024-11-21
CVE-2022-40315
A limited SQL injection risk was identified in the "browse list of users" site administration page.
Modified: 2024-11-21
CVE-2022-40316
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
Modified: 2024-11-21
CVE-2022-45149
A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862
- https://bugzilla.redhat.com/show_bug.cgi?id=2142772
- https://bugzilla.redhat.com/show_bug.cgi?id=2142772
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440769
- https://moodle.org/mod/forum/discuss.php?d=440769
Modified: 2024-11-21
CVE-2022-45150
A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
- https://bugzilla.redhat.com/show_bug.cgi?id=2142773
- https://bugzilla.redhat.com/show_bug.cgi?id=2142773
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440770
- https://moodle.org/mod/forum/discuss.php?d=440770
Modified: 2024-11-21
CVE-2022-45151
The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several "social" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76131
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76131
- https://bugzilla.redhat.com/show_bug.cgi?id=2142774
- https://bugzilla.redhat.com/show_bug.cgi?id=2142774
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440771
- https://moodle.org/mod/forum/discuss.php?d=440771
Modified: 2024-11-21
CVE-2022-45152
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440772
- https://moodle.org/mod/forum/discuss.php?d=440772
Modified: 2024-11-21
CVE-2023-1402
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
Modified: 2024-11-21
CVE-2023-23921
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021
Modified: 2024-11-21
CVE-2023-23923
The vulnerability was found Moodle which exists due to insufficient limitations on the "start page" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862
- https://bugzilla.redhat.com/show_bug.cgi?id=2162549
- https://bugzilla.redhat.com/show_bug.cgi?id=2162549
- https://moodle.org/mod/forum/discuss.php?d=443274#p1782023
- https://moodle.org/mod/forum/discuss.php?d=443274#p1782023
Modified: 2024-11-21
CVE-2023-28329
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
Modified: 2024-11-21
CVE-2023-28330
Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
Modified: 2025-02-26
CVE-2023-28331
Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
Modified: 2024-11-21
CVE-2023-28332
If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.
Modified: 2024-11-21
CVE-2023-28333
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
Modified: 2024-11-21
CVE-2023-28336
Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
Modified: 2024-11-21
CVE-2023-30944
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- https://bugzilla.redhat.com/show_bug.cgi?id=2188606
- FEDORA-2023-0ab503de3d
- FEDORA-2023-60a90b6e6a
- FEDORA-2023-49eb814ccc
- https://moodle.org/mod/forum/discuss.php?d=446286
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- https://moodle.org/mod/forum/discuss.php?d=446286
- FEDORA-2023-49eb814ccc
- FEDORA-2023-60a90b6e6a
- FEDORA-2023-0ab503de3d
- https://bugzilla.redhat.com/show_bug.cgi?id=2188606
Modified: 2024-11-21
CVE-2023-35131
Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.
Modified: 2024-11-21
CVE-2023-35132
A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Modified: 2024-11-21
CVE-2023-35133
An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Closed vulnerabilities
BDU:2019-01250
Уязвимость реализации протокола Netatalk, связанная с записью за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2008-5718
The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
- SUSE-SR:2009:004
- SUSE-SR:2009:004
- 50824
- 50824
- 33227
- 33227
- 33548
- 33548
- 34484
- 34484
- http://sourceforge.net/project/shownotes.php?release_id=648189
- http://sourceforge.net/project/shownotes.php?release_id=648189
- DSA-1705
- DSA-1705
- [oss-security] 20090114 update on CVE-2008-5718
- [oss-security] 20090114 update on CVE-2008-5718
- 32925
- 32925
- FEDORA-2009-3064
- FEDORA-2009-3064
- FEDORA-2009-3069
- FEDORA-2009-3069
Modified: 2025-01-14
CVE-2018-1160
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
- http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
- http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
- 106301
- 106301
- https://attachments.samba.org/attachment.cgi?id=14735
- https://attachments.samba.org/attachment.cgi?id=14735
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
- DSA-4356
- DSA-4356
- 46034
- 46034
- 46048
- 46048
- 46675
- 46675
- https://www.synology.com/security/advisory/Synology_SA_18_62
- https://www.synology.com/security/advisory/Synology_SA_18_62
- https://www.tenable.com/security/research/tra-2018-48
- https://www.tenable.com/security/research/tra-2018-48
Modified: 2025-01-14
CVE-2021-31439
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology DiskStation Manager. Authentication is not required to exploit this vulnerablity. The specific flaw exists within the processing of DSI structures in Netatalk. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12326.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26
- https://www.synology.com/zh-hk/security/advisory/Synology_SA_20_26
- https://www.zerodayinitiative.com/advisories/ZDI-21-492/
- https://www.zerodayinitiative.com/advisories/ZDI-21-492/
Modified: 2024-11-21
CVE-2022-0194
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the ad_addcomment function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15876.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-530/
- https://www.zerodayinitiative.com/advisories/ZDI-22-530/
Modified: 2024-11-21
CVE-2022-23121
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parse_entries function. The issue results from the lack of proper error handling when parsing AppleDouble entries. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15819.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230601 [SECURITY] [DLA 3426-2] netatalk regression update
- [debian-lts-announce] 20230601 [SECURITY] [DLA 3426-2] netatalk regression update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-527/
- https://www.zerodayinitiative.com/advisories/ZDI-22-527/
Modified: 2024-11-21
CVE-2022-23122
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the setfilparams function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15837.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-529/
- https://www.zerodayinitiative.com/advisories/ZDI-22-529/
Modified: 2024-11-21
CVE-2022-23123
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getdirparams method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15830.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3426-3] netatalk regression update
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3426-3] netatalk regression update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-528/
- https://www.zerodayinitiative.com/advisories/ZDI-22-528/
Modified: 2024-11-21
CVE-2022-23124
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the get_finderinfo method. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-15870.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-525/
- https://www.zerodayinitiative.com/advisories/ZDI-22-525/
Modified: 2024-11-21
CVE-2022-23125
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Netatalk. Authentication is not required to exploit this vulnerability. The specific flaw exists within the copyapplfile function. When parsing the len element, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15869.
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- [debian-lts-announce] 20230516 [SECURITY] [DLA 3426-1] netatalk security update
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- https://netatalk.sourceforge.io/3.1/ReleaseNotes3.1.13.html
- GLSA-202311-02
- GLSA-202311-02
- DSA-5503
- DSA-5503
- https://www.zerodayinitiative.com/advisories/ZDI-22-526/
- https://www.zerodayinitiative.com/advisories/ZDI-22-526/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-3648
Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
Modified: 2024-11-21
CVE-2023-3649
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.6 allows denial of service via packet injection or crafted capture file