It was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.
Severity/Risk: | Serious |
Versions affected: | 3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versions |
Versions fixed: | 3.10.1, 3.9.4, 3.8.7 and 3.5.16 |
Reported by: | Frédéric Massart |
Workaround: | Harcode preventexecpath to true in config.php, which prevents site administrators setting some executable paths via the UI. See https://docs.moodle.org/310/en/report/security/report_security_check_preventexecpath for more details. |
CVE identifier: | CVE-2021-20187 |
Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68486 |
Tracker issue: | MDL-68486 Arbitrary PHP code execution by site admins via Shibboleth configuration |