SB2024061940 - Multiple vulnerabilities in Moodle
Published: June 19, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Stored cross-site scripting (CVE-ID: CVE-2024-38274)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data within calendar's event title when deleting the event. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Information disclosure (CVE-ID: CVE-2024-38273)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to insufficient capability checks. A remote user can gain access to BigBlueButton join URLs they did not have permission to access.
3) Improper access control (CVE-ID: CVE-2024-38277)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to QR login key and auto-login key for the Moodle mobile app are not generated as separate keys. A remote attacker can use the same key between the two.
4) Information disclosure (CVE-ID: CVE-2024-38275)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote attacker can gain unauthorized access to HTTP authorization headers.
5) Cross-site request forgery (CVE-ID: CVE-2024-38276)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin within confirm_sesskey. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
Remediation
Install update from vendor's website.
References
- https://moodle.org/mod/forum/discuss.php?d=459499
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81412
- https://moodle.org/mod/forum/discuss.php?d=459498
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81778
- https://moodle.org/mod/forum/discuss.php?d=459502
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80959
- https://moodle.org/mod/forum/discuss.php?d=459500
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81774
- https://moodle.org/mod/forum/discuss.php?d=459501
- https://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81890