SB2019071702 - Multiple vulnerabilities in Moodle
Published: July 17, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper access control (CVE-ID: CVE-2019-10187)
The vulnerability allows a remote attacker to delete glossary entries.
The vulnerability exists due to improper access restrictions when deleting glossary entries. A remote authenticated attacker can delete arbitrary entries from glossaries that do not belong to the user.
2) Cross-site request forgery (CVE-ID: CVE-2019-10186)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin when loading or unloading XML files. A remote attacker can trick the victim to visit a specially crafted web page and load or unload arbitrary XML files on behalf of the victim on the vulnerable website.
3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10188)
The vulnerability allows a remote authenticated user to change group permissions.
The vulnerability exists due to incorrect handling of group membership rights. A remote authenticated teacher in a quiz group can modify group overrides for other groups in the same quiz.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2019-10189)
The vulnerability allows a remote authenticated user to change group permissions.
The vulnerability exists due to incorrect handling of group membership rights. A remote authenticated teacher in an assignment group can modify group overrides for other groups in the same assignment
5) Deserialization of Untrusted Data (CVE-ID: CVE-2018-17057)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data passed via the phar:// wrapper. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
Install update from vendor's website.