It was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.
|Versions affected:||3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versions|
|Versions fixed:||3.10.1, 3.9.4, 3.8.7 and 3.5.16|
|Reported by:||Frédéric Massart|
|Workaround:||Harcode preventexecpath to true in config.php, which prevents site administrators setting some executable paths via the UI. See https://docs.moodle.org/310/en/report/security/report_security_check_preventexecpath for more details.|
|Tracker issue:||MDL-68486 Arbitrary PHP code execution by site admins via Shibboleth configuration|