MSA-19-0028: Email media URL tokens were not checking for user status

von Michael Hawkins. Tokens used to fetch inline attachments in email notifications were not disabled when a users account was no longer active. Note: to access files, a user would need to know the file path, and their token.Severity/Risk:MinorVersions affected:3.7 to 3.7.2 and 3.6 to 3.6.6Versions fixed:3.7.3 and 3.6.7Reported by:Juan LeyvaCVE identifier:CVE-2019-14883Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66377Tracker More info: https://moodle.org/mod/forum/discuss.php?d=393586&parent=1586750

MSA-20-0001: Stored XSS in message conversation overview

von Michael Hawkins. Messages required extra sanitizing before updating the conversation overview, to prevent the risk of stored XSS.Severity/Risk:SeriousVersions affected:3.8Versions fixed:3.8.1Reported by:Cid da CostaWorkaround:Disable the messaging system until the patch has been applied.CVE identifier:CVE-2020-1691Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67637Tracker issue:MDL-67637 Stored XSS in message conversation overview More info: https://moodle.org/mod/forum/discuss.php?d=395953&parent=1596360

MSA-19-0029: Reflected XSS possible from some fatal error messages

von Michael Hawkins. Fatal error messages required extra sanitizing to prevent reflected XSS risks on some pages.Severity/Risk:SeriousVersions affected:3.7 to 3.7.2, 3.6 to 3.6.6, 3.5 to 3.5.8 and earlier unsupported versionsVersions fixed:3.7.3, 3.6.7 and 3.5.9Reported by:Yuriy DyachenkoCVE identifier:CVE-2019-14884Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66161Tracker issue:MDL-66161 Reflected XSS possible from some fatal error More info: https://moodle.org/mod/forum/discuss.php?d=393587&parent=1586751

MSA-20-0003: IP addresses can be spoofed using X-Forwarded-For

von Michael Hawkins. X-Forwarded-For headers could be used to spoof a users IP, in order to bypass remote address checks.PATCH NOTE: For user IPs to be checked (and logged) accurately after this patch is applied, sites using multiple levels of reverse proxies/balancers that append to the X-Forwarded-For header will need to configure the new "reverseproxyignore" setting. This ensures the IPs of the later proxies are ignored in favour of the users IP. Severity/Risk: Serious More info: https://moodle.org/mod/forum/discuss.php?d=398351&parent=1606855

MSA-20-0002: Grade history report does not respect Separate groups mode in the course settings

von Michael Hawkins. Users viewing the grade history report without the access all groups capability were not restricted to viewing grades of users within their own groups.Severity/Risk:MinorVersions affected:3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versionsVersions fixed:3.8.2, 3.7.5, 3.6.9 and 3.5.11Reported by:Tim HuntCVE identifier:CVE-2020-1754Changes More info: https://moodle.org/mod/forum/discuss.php?d=398350&parent=1606854

MSA-20-0004: Admin PHP unit webrunner tool requires additional input escaping

von Michael Hawkins. Insufficient input escaping was applied to the PHP unit webrunner admin tool.NOTE: It is important to note that this update is only flagged as a precautionary measure, as it may provide limited CLI access to Moodle site admins. This may be considered a security risk in circumstances where admins do not ordinarily have access to the server CLI and/or in some hosting situations where site admins are not considered trusted users. This tool will also be removed entirely from More info: https://moodle.org/mod/forum/discuss.php?d=398352&parent=1606856

Vulnerabilities Patched in IMPress for IDX Broker

https://www.wordfence.com/blog/2020/03/vulnerabilities-patched-in-impress-for-idx-broker/ On February 28, 2020, the Wordfence Threat Intelligence team became aware of a newly patched stored Cross-Site Scripting (XSS) vulnerability in IMPress for IDX Broker, a WordPress plugin with over 10,000 installations. Although all Wordfence users, including those still using the free version of Wordfence, were already protected from this vulnerability by the Web […] More info: https://www.wordfence.com/blog/2020/03/vulnerabilities-patched-in-impress-for-idx-broker/

WordPress activity logs for newbies

https://www.wpsecurityauditlog.com/wordpress-admin/wordpress-activity-logs-newbies/ WordPress activity logs help site administrators better manage their WordPress websites and users, and keep them secure. Activity logs are also very helpful in a post hack scenario, to identify the source of the attack. If you are new to WordPress activity logs, this article is for you. We will explain what activity logs […] More info: https://www.wpsecurityauditlog.com/wordpress-admin/wordpress-activity-logs-newbies/

BIG-IP HTTP/3 QUIC vulnerability CVE-2020-5859

BIG-IP HTTP/3 QUIC vulnerability CVE-2020-5859 Security Advisory Security Advisory Description Specially formatted HTTP/3 messages may cause the Traffic Management Microkernel (TMM) to produce a ... More info: https://support.f5.com/csp/article/K61367237?utm_source=f5support&utm_medium=RSS
Translate »