|
|
Message-ID: <50FCA5DF.3030105@moodle.com>
Date: Mon, 21 Jan 2013 10:20:15 +0800
From: Michael de Raadt <michaeld@...dle.com>
To: oss-security@...ts.openwall.com
Subject: Moodle security notifications public
The following security notifications have now been made public. Thanks
to OSS members for their cooperation.
=======================================================================
MSA-13-0001: Security issue in Google Spellchecker in TinyMCE
Description: A security issue was reported by TinyMCE. This fix
has been applied to Moodle.
Issue summary: import tinymce spellchecker 2.0.6.1
Severity/Risk: Serious
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+
Reported by: Petr Škoda
Issue no.: MDL-37283
CVE Identifier: CVE-2012-6112
Workaround: Disable spellchecker plugin
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37283
=======================================================================
MSA-13-0002: Capability issue with Outcome editing
Description: Users without the appropriate capability were able
to set a custom outcome they had created as a
standard site-wide capability when editing that
outcome.
Issue summary: Teachers can set Outcomes to be Standard when
re-editing
Severity/Risk: Minor
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+
1.9 to 1.9.19
Reported by: Elena Ivanova
Issue no.: MDL-27619
CVE Identifier: CVE-2012-6098
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-27619
=======================================================================
MSA-13-0003: Potential server file access through backup restoration
Description: Paths in backups to restorable files were not being
sufficiently validated and could be manipulated to
gain access to files on the server.
Issue summary: moodle1 backup converter path not properly validated
Severity/Risk: Serious
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+
Reported by: Dan Poltawski
Issue no.: MDL-36977
CVE Identifier: CVE-2012-6099
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36977
=======================================================================
MSA-13-0004: Information leak through activity report
Description: Under certain circumstances, when last access is
included in a list of fields forced to be hidden,
the Activity report would still reveal users' last
access.
Issue summary: Activity Report showing lastaccess even if it is a
hidden field
Severity/Risk: Minor
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+
Reported by: Jody Steele
Issue no.: MDL-33340
CVE Identifier: CVE-2012-6100
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-33340
=======================================================================
MSA-13-0005: Potential phishing attack through URL redirects
Description: Insufficient filtering of return URLs on some pages
was allowing redirects to sites outside Moodle.
Issue summary: Open redirect issues
Severity/Risk: Minor
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+
Reported by: Simon Coggins
Issue no.: MDL-35991
CVE Identifier: CVE-2012-6101
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-35991
=======================================================================
MSA-13-0006: Potential information leak in Assignment module
Description: Through URL manipulation, students were able to view
feedback comments provided on other student's
submissions.
Issue summary: Assignment comment permissions are not being
validated
Severity/Risk: Serious
Versions affected: 2.4, 2.3 to 2.3.3+
Reported by: Dan Poltawski
Issue no.: MDL-37244
CVE Identifier: CVE-2012-6102
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37244
=======================================================================
MSA-13-0007: Potential exploit in messaging
Description: The messaging system was not checking the user's
session correctly when messages are sent.
Issue summary: Course message sending can be exploited by CSRF
Severity/Risk: Minor
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+
Reported by: Andrew Nicols
Issue no.: MDL-36600
CVE Identifier: CVE-2012-6103
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36600
=======================================================================
MSA-13-0008: Information leak through Blog RSS
Description: Blog posts that were hidden from guest users in the
Web interface were being included in the related RSS
feed.
Issue summary: Guest users can access RSS feed for site level blogs
Severity/Risk: Minor
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+
Reported by: Charles Fulton
Issue no.: MDL-36620
CVE Identifier: CVE-2012-6104
Workaround: Disable blogging
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-36620
=======================================================================
MSA-13-0009: Information leak through Blog RSS
Description: Blog posts were still accessible via the blog RSS
feed, even after blogging was disabled globally.
Issue summary: Blog posts still available via RSS even after the
blogging is disabled
Severity/Risk: Minor
Versions affected: 2.4, 2.3 to 2.3.3+, 2.2 to 2.2.6+, 2.1 to 2.1.9+
Reported by: David Mudrak
Issue no.: MDL-37467
CVE Identifier: CVE-2012-6105
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37467
=======================================================================
MSA-13-0010: Failure to check capabilities in calendar
Description: Students were able to delete course level calendar
subscriptions created by teachers.
Issue summary: Student user able to Remove imported calendar from
Manage Subscriptions
Severity/Risk: Minor
Versions affected: 2.4
Reported by: David O'Brien
Issue no.: MDL-37106
CVE Identifier: CVE-2012-6106
Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-37106
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.