| Description: | The messaging system was not checking the user's session correctly when messages are sent. |
| Issue summary: |
Course message sending can be exploited by CSRF |
| Severity/Risk: | Minor |
| Versions affected: | 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+ |
| Reported by: | Andrew Nicols |
| Issue no.: | MDL-36600 |
|
CVE identifier: |
CVE-2012-6103 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36600 |
Security announcements | Moodle.org
Security announcements
MSA-13-0006: Potential information leak in Assignment module
| Description: | Through URL manipulation, students were able to view feedback comments provided on other student's submissions. |
| Issue summary: |
Assignment comment permissions are not being validated |
| Severity/Risk: | Serious |
| Versions affected: | 2.4, 2.3 to 2.3.3+ |
| Reported by: | Dan Poltawski |
| Issue no.: | MDL-37244 |
|
CVE identifier: |
CVE-2012-6102 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37244 |
MSA-13-0005: Potential phishing attack through URL redirects
| Description: | Insufficient filtering of return URLs on some pages was allowing redirects to sites outside Moodle. |
| Issue summary: |
Open redirect issues |
| Severity/Risk: | Minor |
| Versions affected: | 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+ |
| Reported by: | Simon Coggins |
| Issue no.: | MDL-35991 |
|
CVE identifier: |
CVE-2012-6101 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-35991 |
MSA-13-0004: Information leak through activity report
| Description: | Under certain circumstances, when last access is included in a list of fields forced to be hidden, the Activity report would still reveal users' last access. |
| Issue summary: |
Activity Report showing lastaccess even if it is a hidden field |
| Severity/Risk: | Minor |
| Versions affected: | 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+ |
| Reported by: | Jody Steel |
| Issue no.: | MDL-33340 |
|
CVE identifier: |
CVE-2012-6100 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33340 |
MSA-13-0003: Potential server file access through backup restoration
| Description: | Paths in backups to restorable files were not being sufficiently validated and could be manipulated to gain access to files on the server. |
| Issue summary: |
moodle1 backup converter path not properly validated |
| Severity/Risk: | Serious |
| Versions affected: | 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+ |
| Reported by: | Dan Poltawski |
| Issue no.: | MDL-36977 |
|
CVE identifier: |
CVE-2012-6099 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36977 |
MSA-13-0002: Capability issue with Outcome editing
| Description: | Users without the appropriate capability were able to set a custom outcome they had created as a standard site-wide capability when editing that outcome. |
| Issue summary: |
Teachers can set Outcomes to be Standard when re-editing |
| Severity/Risk: | Minor |
| Versions affected: | 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+ 1.9 to 1.9.19 |
| Reported by: | Elena Ivanov |
| Issue no.: | MDL-27619 |
|
CVE identifier: |
CVE-2012-6098 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-27619 |
MSA-13-0001: Security issue in Google Spellchecker in TinyMCE
| Description: | A security issue was reported by TinyMCE. This fix has been applied to Moodle. |
| Issue summary: |
import tinymce spellchecker 2.0.6.1 |
| Severity/Risk: | Serious |
| Versions affected: | 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+ |
| Reported by: | Petr Škoda |
| Issue no.: | MDL-37283 |
|
CVE identifier: |
CVE-2012-6112 |
|
Workaround: |
Disable spellchecker plugin |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37283 |
MSA-12-0063: Information leak in Check Permissions page
| Topic: | Check Permissions page displays entire user base without moodle/role:manage capability |
| Severity/Risk: | Minor |
| Versions affected: | 2.3 to 2.3.2+ |
| Reported by: | Jody Steele |
| Issue no.: | MDL-35381 |
|
CVE Identifier: |
CVE-2012-5481 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-35381 |
Description:
The Check Permissions page was allowing non-admin users to see the capabilities of all users, not just users in a course/category.
MSA-12-0062: Information leak in Database activity module
| Topic: | Any user (including a guest) can view entries in database activity when more entries are required before viewing other participants entries |
| Severity/Risk: | Minor |
| Versions affected: | 2.3 to 2.3.2+, 2.2 to 2.2.5+, 2.1 to 2.1.8+ |
| Reported by: | Tabitha Roder |
| Issue no.: | MDL-35558 |
|
CVE Identifier: |
CVE-2012-5480 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-35558 |
Description:
The setting requiring that a number of entries be posted to a Database activity before others' entries could be viewed could be circumvented using an advanced search.
MSA-12-0061: Remote code execution through Portfolio API
| Topic: | Portfolio plugin: Local File Inclusion (LFI) and the possibility of Remote Command Execution (RCE). |
| Severity/Risk: | Serious |
| Versions affected: | 2.3 to 2.3.2+, 2.2 to 2.2.5+, 2.1 to 2.1.8+ |
| Reported by: | Cristobal Leiva |
| Issue no.: | MDL-33791 |
|
CVE Identifier: |
CVE-2012-5479 |
| Changes (master): | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36346 |
Description:
It was possible, when Moodle data is stored within the Web accessible directory, to manipulate the Portfolio API callbacks to execute a file uploaded by a user.