Bug 2179406 (CVE-2023-28329, MSA-23-0004)
Summary: | CVE-2023-28329 moodle: Authenticated SQL injection via availability check | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED UPSTREAM | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | moodle 4.1.2, moodle 4.0.7, moodle 3.11.13, moodle 3.9.20 | Doc Type: | If docs needed, set a value |
Doc Text: |
Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers). This flaw affects Moodle versions 4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2023-03-20 20:31:41 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2180072, 2180073 | ||
Bug Blocks: | 2178257, 2180121 |
Description
Guilherme de Almeida Suckevicz
2023-03-17 17:35:01 UTC
Created moodle tracking bugs for this issue: Affects: epel-7 [bug 2180073] Affects: fedora-all [bug 2180072] This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products. |