WordPress 5.5 Release Candidate

The first release candidate for WordPress 5.5 is now available! This is an important milestone in the community’s progress toward the final release of WordPress 5.5. “Release Candidate” means that the new version is ready for release, but with millions of users and thousands of plugins and themes, it’s possible something was missed. WordPress 5.5 […] More info: https://wordpress.org/news/2020/07/wordpress-5-5-release-candidate/

Critical Arbitrary File Upload Vulnerability Patched in wpDiscuz Plugin

On June 19th, our Threat Intelligence team discovered a vulnerability present in Comments – wpDiscuz, a WordPress plugin installed on over 80,000 sites. This flaw gave unauthenticated attackers the ability to upload arbitrary files, including PHP files, and achieve remote code execution on a vulnerable site’s server. We initially reached out to the plugin’s developer […] More info: https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/

MSA-20-0003: IP addresses can be spoofed using X-Forwarded-For

von Michael Hawkins. X-Forwarded-For headers could be used to spoof a users IP, in order to bypass remote address checks.PATCH NOTE: For user IPs to be checked (and logged) accurately after this patch is applied, sites using multiple levels of reverse proxies/balancers that append to the X-Forwarded-For header will need to configure the new "reverseproxyignore" setting. This ensures the IPs of the later proxies are ignored in favour of the users IP. Severity/Risk: Serious Versions More info: https://moodle.org/mod/forum/discuss.php?d=398351&parent=1606855

MSA-20-0005: MathJax URL upgraded to later version to remove XSS risk (upstream)

von Michael Hawkins. MathJax versions 2.7.2 and earlier contain a stored XSS risk. The MathJax URL has been updated to reference a newer version, which has the vulnerability patched.Severity/Risk:SeriousVersions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versionsVersions fixed:3.8.3, 3.7.6, 3.6.10 and 3.5.12Reported by:Abdullah HussamWorkaround:Manually update the MathJax URL in site administration to reference the patched version More info: https://moodle.org/mod/forum/discuss.php?d=403512&parent=1628590

MSA-20-0006: Remote code execution possible via SCORM packages

von Michael Hawkins. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.Severity/Risk:SeriousVersions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versionsVersions fixed:3.8.3, 3.7.6, 3.6.10 and 3.5.12Reported by:Paul HoldenWorkaround:Disable the SCORM package activity type until the patch is applied.CVE More info: https://moodle.org/mod/forum/discuss.php?d=403513&parent=1628593

MSA-20-0008: Reflected XSS in admin task logs filter

von Michael Hawkins. The filter in the admin task log required extra sanitizing to prevent a reflected XSS risk.Severity/Risk:SeriousVersions affected:3.9, 3.8 to 3.8.3 and 3.7 to 3.7.6Versions fixed:3.9.1, 3.8.4 and 3.7.7Reported by:Spyridon ChatzimichailCVE identifier:CVE-2020-14320Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69128Tracker issue:MDL-69128 Reflected XSS in admin task logs filter More info: https://moodle.org/mod/forum/discuss.php?d=407392&parent=1644267

MSA-20-0007: Vulnerable JavaScript libraries: jQuery 1.9.1 (upstream)

von Michael Hawkins. The JQuery version used by the H5P library contained a prototype pollution risk, which has now been updated to a patched version.Severity/Risk:MinorVersions affected:3.8 to 3.8.3Versions fixed:3.8.4 and 3.9Reported by:weblendwebCVE identifier:CVE-2019-11358Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68704Tracker issue:MDL-68704 Vulnerable JavaScript libraries: jQuery 1.9.1 (upstream) More info: https://moodle.org/mod/forum/discuss.php?d=407391&parent=1644266

MSA-20-0010: yui_combo should mitigate denial of service risk

von Michael Hawkins. yui_combo needed to limit the amount of files it can load to help mitigate the risk of denial of service.Severity/Risk:SeriousVersions affected:3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12 and earlier unsupported versionsVersions fixed:3.9.1, 3.8.4, 3.7.7 and 3.5.13Reported by:Yuri ZwaigCVE identifier:CVE-2020-14322Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68426Tracker issue:MDL-68426 yui_combo should mitigate More info: https://moodle.org/mod/forum/discuss.php?d=407394&parent=1644269

MSA-20-0009: Course enrolments allowed privilege escalation from teacher role into manager role

von Michael Hawkins. Teachers of a course were able to assign themselves the manager role within that course.Severity/Risk:SeriousVersions affected:3.9, 3.8 to 3.8.3, 3.7 to 3.7.6, 3.5 to 3.5.12 and earlier unsupported versionsVersions fixed:3.9.1, 3.8.4, 3.7.7 and 3.5.13Reported by:Kien HoangCVE identifier:CVE-2020-14321Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69093Tracker issue:MDL-69093 Course enrolments allowed privilege More info: https://moodle.org/mod/forum/discuss.php?d=407393&parent=1644268
Translate »