The “edit_blog.php” script allows a registered user to add external RSS feed resources. It was identified that this feature could be abused to be used as a SSRF attack vector by adding a malicious URL/TCP PORT in order to target internal network or an internet hosted server, bypassing firewall rules, IP filtering and more. This kind of vulnerability is then called “blind” because of no response available on Moodle web site, enforcing attacker to exploit it using a “time based” approach. The discovered issue permit to perform GET request, inluding parameters that allows an attacker to potentially perform remote code execution (RCE) exploiting a vulnerability. Reference: https://www.excellium-services.com/cert-xlm-advisory/cve-2019-6970/
Created moodle tracking bugs for this issue: Affects: fedora-28 [bug 1691642]
Created moodle tracking bugs for this issue: Affects: epel-all [bug 1691643]
This comment was flagged a spam, view the edit history to see the original text if required.