Bug 2311428 - CVE-2024-45691 moodle: Lesson activity password bypass through PHP loose comparison [fedora-all]
Summary: CVE-2024-45691 moodle: Lesson activity password bypass through PHP loose comp...
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: moodle
Version: 40
Hardware: Unspecified
OS: Unspecified
high
high
Target Milestone: ---
Assignee: Gwyn Ciesla
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard: {"flaws": ["31e8bc14-ad43-4285-ae8d-3...
Depends On:
Blocks: CVE-2024-45691
TreeView+ depends on / blocked
 
Reported: 2024-09-11 08:07 UTC by Avinash Hanwate
Modified: 2025-03-05 02:12 UTC (History)
3 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2025-03-05 02:12:13 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Avinash Hanwate 2024-09-11 08:07:09 UTC
More information about this security flaw is available in the following bug:

https://bugzilla.redhat.com/show_bug.cgi?id=2309940

Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Sergio Basto 2025-03-05 02:12:13 UTC
current versions: moodle-4.5.2-1.fc42, moodle-4.4.6-1.fc41 and moodle-4.3.10-1.fc40

https://moodle.org/mod/forum/discuss.php?d=461897#p1854494

When restricting access to a Lesson activity with a password, certain passwords could be bypassed/less secure due to a loose comparison in the password checking logic.

Note: this only affected passwords that are set to "magic hash" values. These are certain values where a loose comparison in the code can result in multiple values "matching" the password, instead of the expected behaviour that only an exact match for the password will be accepted.

Severity/Risk: 	Minor
Versions affected: 	4.4 to 4.4.2, 4.3 to 4.3.6, 4.2 to 4.2.9, 4.1 to 4.1.12 and earlier unsupported versions
Versions fixed: 	4.4.3, 4.3.7, 4.2.10 and 4.1.13
Reported by: 	TaiYou
Workaround: 	Avoid using passwords which are considered to be a "magic hash" value (such as those beginning with "0e" followed by digits).
CVE identifier: 	CVE-2024-45691
Changes (main): 	http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-82365
Tracker issue: 	MDL-82365 Lesson activity password bypass through PHP loose comparison


Note You need to log in before you can comment on or make changes to this bug.