Security announcements

MSA-20-0007: Vulnerable JavaScript libraries: jQuery 1.9.1 (upstream)

Bởi Michael Hawkins -

The JQuery version used by the H5P library contained a prototype pollution risk, which has now been updated to a patched version.


Severity/Risk: Minor
Versions affected: 3.8 to 3.8.3
Versions fixed: 3.8.4 and 3.9
Reported by: weblendweb
CVE identifier: CVE-2019-11358
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68704
Tracker issue: MDL-68704 Vulnerable JavaScript libraries: jQuery 1.9.1 (upstream)

MSA-20-0006: Remote code execution possible via SCORM packages

Bởi Michael Hawkins -

It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.


Severity/Risk: Serious
Versions affected: 3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versions
Versions fixed: 3.8.3, 3.7.6, 3.6.10 and 3.5.12
Reported by: Paul Holden
Workaround: Disable the 'SCORM package' activity type until the patch is applied.
CVE identifier: CVE-2020-10738
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68410
Tracker issue: MDL-68410 Remote code execution possible via SCORM packages

MSA-20-0005: MathJax URL upgraded to later version to remove XSS risk (upstream)

Bởi Michael Hawkins -

MathJax versions 2.7.2 and earlier contain a stored XSS risk. The MathJax URL has been updated to reference a newer version, which has the vulnerability patched.


Severity/Risk: Serious
Versions affected: 3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versions
Versions fixed: 3.8.3, 3.7.6, 3.6.10 and 3.5.12
Reported by: Abdullah Hussam
Workaround: Manually update the MathJax URL in site administration to reference the patched version (https://cdn.jsdelivr.net/npm/mathjax@2.7.8/MathJax.js)
CVE identifier: CVE-2018-1999024
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68430
Tracker issue: MDL-68430 MathJax URL upgraded to later version to remove XSS risk (upstream)

MSA-20-0004: Admin PHP unit webrunner tool requires additional input escaping

Bởi Michael Hawkins -

Insufficient input escaping was applied to the PHP unit webrunner admin tool.

NOTE: It is important to note that this update is only flagged as a precautionary measure, as it may provide limited CLI access to Moodle site admins. This may be considered a security risk in circumstances where admins do not ordinarily have access to the server CLI and/or in some hosting situations where site admins are not considered trusted users. This tool will also be removed entirely from Moodle 3.9.


Severity/Risk: Minor
Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versions
Versions fixed: 3.8.2, 3.7.5, 3.6.9 and 3.5.11
Reported by: Brendan Heywood
CVE identifier: CVE-2020-1756
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67726
Tracker issue: MDL-67726 Admin PHP unit webrunner tool requires additional input escaping

MSA-20-0003: IP addresses can be spoofed using X-Forwarded-For

Bởi Michael Hawkins -

X-Forwarded-For headers could be used to spoof a user's IP, in order to bypass remote address checks.

PATCH NOTE: For user IPs to be checked (and logged) accurately after this patch is applied, sites using multiple levels of reverse proxies/balancers that append to the X-Forwarded-For header will need to configure the new "reverseproxyignore" setting. This ensures the IPs of the later proxies are ignored in favour of the user's IP.


Severity/Risk: Serious
Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versions
Versions fixed: 3.8.2, 3.7.5, 3.6.9 and 3.5.11
Reported by: Brendan Heywood
CVE identifier: CVE-2020-1755
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67861
Tracker issue: MDL-67861 IP addresses can be spoofed using X-Forwarded-For

MSA-20-0002: Grade history report does not respect Separate groups mode in the course settings

Bởi Michael Hawkins -

Users viewing the grade history report without the 'access all groups' capability were not restricted to viewing grades of users within their own groups.


Severity/Risk: Minor
Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versions
Versions fixed: 3.8.2, 3.7.5, 3.6.9 and 3.5.11
Reported by: Tim Hunt
CVE identifier: CVE-2020-1754
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-56287
Tracker issue: MDL-56287 Grade history report does not respect Separate groups mode in the course settings

MSA-20-0001: Stored XSS in message conversation overview

Bởi Michael Hawkins -

Messages required extra sanitizing before updating the conversation overview, to prevent the risk of stored XSS.


Severity/Risk: Serious
Versions affected: 3.8
Versions fixed: 3.8.1
Reported by: Cid da Costa
Workaround: Disable the messaging system until the patch has been applied.
CVE identifier: CVE-2020-1691
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67637
Tracker issue: MDL-67637 Stored XSS in message conversation overview

MSA-19-0029: Reflected XSS possible from some fatal error messages

Bởi Michael Hawkins -

Fatal error messages required extra sanitizing to prevent reflected XSS risks on some pages.


Severity/Risk: Serious
Versions affected: 3.7 to 3.7.2, 3.6 to 3.6.6, 3.5 to 3.5.8 and earlier unsupported versions
Versions fixed: 3.7.3, 3.6.7 and 3.5.9
Reported by: Yuriy Dyachenko
CVE identifier: CVE-2019-14884
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66161
Tracker issue: MDL-66161 Reflected XSS possible from some fatal error messages

MSA-19-0028: Email media URL tokens were not checking for user status

Bởi Michael Hawkins -

Tokens used to fetch inline attachments in email notifications were not disabled when a user's account was no longer active. Note: to access files, a user would need to know the file path, and their token.


Severity/Risk: Minor
Versions affected: 3.7 to 3.7.2 and 3.6 to 3.6.6
Versions fixed: 3.7.3 and 3.6.7
Reported by: Juan Leyva
CVE identifier: CVE-2019-14883
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66377
Tracker issue: MDL-66377 Email media URL tokens were not checking for user status

MSA-19-0027: Open redirect in Lesson edit page

Bởi Michael Hawkins -

An open redirect existed in the Lesson edit page.


Severity/Risk: Minor
Versions affected: 3.7 to 3.7.2, 3.6 to 3.6.6, 3.5 to 3.5.8 and earlier unsupported versions
Versions fixed: 3.7.3, 3.6.7 and 3.5.9
Reported by: Paul Holden
CVE identifier: CVE-2019-14882
Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66228
Tracker issue: MDL-66228 Open redirect in Lesson edit page