Bug 2236447 (CVE-2023-40316, MSA-23-0019)

Summary: CVE-2023-40316 moodle: proxy bypass risk due to insufficient validation
Product: [Other] Security Response Reporter: TEJ RATHI <trathi>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: moodle 4.2.2, moodle 4.1.5, moodle 4.0.10, moodle 3.11.16, moodle 3.9.23 Doc Type: ---
Doc Text:
Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2236459, 2236460    
Bug Blocks: 2236401    

Description TEJ RATHI 2023-08-31 10:17:44 UTC
Incorrect domain matching logic made it possible to bypass the proxy, which could result in access to hosts intended to be blocked by the proxy.

Versions affected: 4.2 to 4.2.1, 4.1 to 4.1.4, 4.0 to 4.0.9, 3.11 to 3.11.15, 3.9 to 3.9.22 and earlier unsupported.

Versions fixed: 4.2.2, 4.1.5, 4.0.10, 3.11.16 and 3.9.23

https://moodle.org/mod/forum/discuss.php?d=449640
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74289

Comment 1 TEJ RATHI 2023-08-31 10:20:34 UTC
Created moodle tracking bugs for this issue:

Affects: epel-7 [bug 2236459]
Affects: fedora-all [bug 2236460]