|
Message-ID: <5056A26B.5020905@moodle.com> Date: Mon, 17 Sep 2012 12:09:15 +0800 From: Michael de Raadt <michaeld@...dle.com> To: oss-security@...ts.openwall.com Subject: Moodle security notifications public The following security notifications have now been made public. Thanks to OSS members for their cooperation. ======================================================================= MSA-12-0051: File upload size constraint issue Topic: /repository/repository_ajax.php allows you to supply -1 for "maxbytes" and side step moodle file size restrictions Severity/Risk: Minor Versions affected: 2.3 to 2.3.1+, 2.2 to 2.2.4+ Reported by: Andrew Davis Issue no.: MDL-30792 CVE Identifier: CVE-2012-4400 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-30792 Description: It was possible for a user to manipulate script parameters to upload a file larger than set limits. ======================================================================= MSA-12-0052: Course topics permission issue Topic: Permissions problems in topic course format Severity/Risk: Minor Versions affected: 2.3 to 2.3.1+, 2.2 to 2.2.4+ Reported by: Alexander Bias Issue no.: MDL-28207 CVE Identifier: 2012-4401 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-28207 Description: Users with course editing capabilities, but without permission to show/hide topics and set the current topic were able to complete these actions under certain conditions. ======================================================================= MSA-12-0053: Blog file access issue Topic: 'publishstate' === 'public' Severity/Risk: Minor Versions affected: 2.3 to 2.3.1+, 2.2 to 2.2.4+, 2.1 to 2.1.7+ Reported by: Kyle Decot Issue no.: MDL-34585 CVE Identifier: CVE-2012-4407 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34585 Description: Files embedded as part of a blog were being delivered without checking the publication state properly. ======================================================================= MSA-12-0054: Course reset permission issue Topic: Course reset not protected by proper capability Severity/Risk: Minor Versions affected: 2.3 to 2.3.1+, 2.2 to 2.2.4+, 2.1 to 2.1.7+ Reported by: Rex Lorenzo Issue no.: MDL-34519 CVE Identifier: CVE-2012-4408 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34519 Description: The course reset link was protected by a correct permission but the reset page itself was being checked for a different permission. ======================================================================= MSA-12-0055: Web service access token issue Topic: A web service token allows the user to run functions from any external service, not just those linked to the external service the token is for Severity/Risk: Serious Versions affected: 2.3 to 2.3.1+, 2.2 to 2.2.4+, 2.1 to 2.1.7+ Reported by: Nathan Mares Issue no.: MDL-34368 CVE Identifier: CVE-2012-4402 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-34368 Description: Users with permission to access multiple services were able to use a token from one service to access another. ======================================================================= MSA-12-0056: Information leak in drag-and-drop Topic: Information disclosure in yui_combo.php Severity/Risk: Minor Versions affected: 2.3 to 2.3.1+ Reported by: Mark Baseggio Issue no.: MDL-35168 CVE Identifier: CVE-2012-4403 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-35168 Description: The drag-and-drop script was responding to bad requests with information that included the full path to scripts on the server.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.