Bug 2142775 (CVE-2022-45152, MSA-22-0032)

Summary: CVE-2022-45152 moodle: blind SSRF risk in LTI provider library
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: moodle 4.0.5, moodle 3.11.11, moodle 3.9.18 Doc Type: If docs needed, set a value
Doc Text:
A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-12-07 20:16:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2144704, 2144705, 2144706, 2144707    
Bug Blocks: 2141946, 2144721    

Description TEJ RATHI 2022-11-15 08:58:37 UTC
MSA-22-0032: Blind SSRF risk in LTI provider library

Moodle's LTI provider library did not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk.

Versions affected: 4.0 to 4.0.4, 3.11 to 3.11.10, 3.9 to 3.9.17 and earlier unsupported versions
Versions fixed:    4.0.5, 3.11.11 and 3.9.18

Comment 3 TEJ RATHI 2022-11-22 03:59:53 UTC
Created moodle tracking bugs for this issue:

Affects: epel-7 [bug 2144704]
Affects: fedora-35 [bug 2144705]
Affects: fedora-36 [bug 2144706]
Affects: fedora-37 [bug 2144707]

Comment 4 Product Security DevOps Team 2022-12-07 20:15:58 UTC
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.