ALT-PU-2023-3948-1
Package moodle updated to version 3.11.15-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-06359
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной очисткой пользовательских данных, позволяющая нарушителю выполнить произвольные SQL-команды
BDU:2022-06382
Уязвимость плагина H5P виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-06383
Уязвимость виртуальной обучающей среды Moodle, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-06402
Уязвимость реализации функции рекурсивного рендеринга компонента Mustache helpers системы шаблонов Mustache template system виртуальной обучающей среды Moodle, позволяющая нарушителю проводить межсайтовые сценарные атаки или вызвать отказ в обслуживании
BDU:2022-07405
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой источника HTTP-запроса в URL-адресе перенаправления курса, позволяющая нарушителю выполнять атаки с подделкой межсайтовых запросов
BDU:2022-07406
Уязвимость системы управления курсами Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)
BDU:2022-07407
Уязвимость системы управления курсами Moodle, связанная с недостаточной очисткой пользовательских данных в нескольких «социальных» полях профиля пользователя, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)
BDU:2022-07408
Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой введенных пользователем данных в библиотеке поставщика LTI, позволяющая нарушителю выполнять SSRF-атаки
BDU:2023-03462
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к ограниченным функциям
Modified: 2024-11-21
CVE-2021-23414
This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.
- https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2
- https://github.com/videojs/video.js/commit/b3acf663641fca0f7a966525a72845af7ec5fab2
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1533588
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587
- https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1533587
- https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429
- https://snyk.io/vuln/SNYK-JS-VIDEOJS-1533429
Modified: 2024-11-21
CVE-2022-0323
Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.
- https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e
- https://github.com/bobthecow/mustache.php/commit/579ffa5c96e1d292c060b3dd62811ff01ad8c24e
- https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7
- https://huntr.dev/bounties/a5f5a988-aa52-4443-839d-299a63f44fb7
Modified: 2024-11-21
CVE-2022-2986
Enabling and disabling installed H5P libraries did not include the necessary token to prevent a CSRF risk.
Modified: 2025-02-20
CVE-2022-40208
In Moodle, insufficient limitations in some quiz web services made it possible for students to bypass sequential navigation during a quiz attempt.
Modified: 2024-11-21
CVE-2022-40313
Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.
Modified: 2024-11-21
CVE-2022-40314
A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified.
Modified: 2024-11-21
CVE-2022-40315
A limited SQL injection risk was identified in the "browse list of users" site administration page.
Modified: 2024-11-21
CVE-2022-40316
The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.
Modified: 2024-11-21
CVE-2022-45149
A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75862
- https://bugzilla.redhat.com/show_bug.cgi?id=2142772
- https://bugzilla.redhat.com/show_bug.cgi?id=2142772
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440769
- https://moodle.org/mod/forum/discuss.php?d=440769
Modified: 2024-11-21
CVE-2022-45150
A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
- https://bugzilla.redhat.com/show_bug.cgi?id=2142773
- https://bugzilla.redhat.com/show_bug.cgi?id=2142773
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440770
- https://moodle.org/mod/forum/discuss.php?d=440770
Modified: 2024-11-21
CVE-2022-45151
The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several "social" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76131
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76131
- https://bugzilla.redhat.com/show_bug.cgi?id=2142774
- https://bugzilla.redhat.com/show_bug.cgi?id=2142774
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440771
- https://moodle.org/mod/forum/discuss.php?d=440771
Modified: 2024-11-21
CVE-2022-45152
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71920
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- https://bugzilla.redhat.com/show_bug.cgi?id=2142775
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-74a9c8e95f
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-f7fdcb1820
- FEDORA-2022-cb7084ae1c
- FEDORA-2022-cb7084ae1c
- https://moodle.org/mod/forum/discuss.php?d=440772
- https://moodle.org/mod/forum/discuss.php?d=440772
Modified: 2024-11-21
CVE-2023-1402
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
Modified: 2024-11-21
CVE-2023-23921
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021
Modified: 2024-11-21
CVE-2023-23923
The vulnerability was found Moodle which exists due to insufficient limitations on the "start page" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76862
- https://bugzilla.redhat.com/show_bug.cgi?id=2162549
- https://bugzilla.redhat.com/show_bug.cgi?id=2162549
- https://moodle.org/mod/forum/discuss.php?d=443274#p1782023
- https://moodle.org/mod/forum/discuss.php?d=443274#p1782023
Modified: 2024-11-21
CVE-2023-28329
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).
Modified: 2024-11-21
CVE-2023-28330
Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.
Modified: 2025-02-26
CVE-2023-28331
Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
Modified: 2024-11-21
CVE-2023-28332
If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.
Modified: 2024-11-21
CVE-2023-28333
The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).
Modified: 2024-11-21
CVE-2023-28336
Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.
Modified: 2024-11-21
CVE-2023-30944
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- https://bugzilla.redhat.com/show_bug.cgi?id=2188606
- FEDORA-2023-0ab503de3d
- FEDORA-2023-60a90b6e6a
- FEDORA-2023-49eb814ccc
- https://moodle.org/mod/forum/discuss.php?d=446286
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77187
- https://moodle.org/mod/forum/discuss.php?d=446286
- FEDORA-2023-49eb814ccc
- FEDORA-2023-60a90b6e6a
- FEDORA-2023-0ab503de3d
- https://bugzilla.redhat.com/show_bug.cgi?id=2188606
Modified: 2024-11-21
CVE-2023-35131
Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.
Modified: 2024-11-21
CVE-2023-35132
A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.
Modified: 2024-11-21
CVE-2023-35133
An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.