MSA-21-0005: Arbitrary PHP code execution by site admins via Shibboleth configuration

MSA-21-0005: Arbitrary PHP code execution by site admins via Shibboleth configuration

by Michael Hawkins -
Number of replies: 0

It was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.


Severity/Risk: Serious
Versions affected: 3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versions
Versions fixed: 3.10.1, 3.9.4, 3.8.7 and 3.5.16
Reported by: Frédéric Massart
Workaround: Harcode preventexecpath to true in config.php, which prevents site administrators setting some executable paths via the UI. See https://docs.moodle.org/310/en/report/security/report_security_check_preventexecpath for more details.
CVE identifier: CVE-2021-20187
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68486
Tracker issue: MDL-68486 Arbitrary PHP code execution by site admins via Shibboleth configuration