Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.0939 Multiple vulnerabilities have been identified in Moodle 17 March 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Moodle Publisher: Moodle Operating System: Windows UNIX variants (UNIX, Linux, OSX) Impact/Access: Provide Misleading Information -- Existing Account Unauthorised Access -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2020-1756 CVE-2020-1755 CVE-2020-1754 Original Bulletin: https://moodle.org/mod/forum/discuss.php?d=398350&parent=1606854 https://moodle.org/mod/forum/discuss.php?d=398351&parent=1606855 https://moodle.org/mod/forum/discuss.php?d=398352&parent=1606856 Comment: This bulletin contains three (3) Moodle security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- MSA-20-0002: Grade history report does not respect Separate groups mode in the course settings Users viewing the grade history report without the 'access all groups' capability were not restricted to viewing grades of users within their own groups. Severity/Risk: Minor Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versions Versions fixed: 3.8.2, 3.7.5, 3.6.9 and 3.5.11 Reported by: Tim Hunt CVE identifier: CVE-2020-1754 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-56287 Tracker issue: MDL-56287 Grade history report does not respect Separate groups mode in the course settings - -------------------------------------------------------------------------------- MSA-20-0003: IP addresses can be spoofed using X-Forwarded-For X-Forwarded-For headers could be used to spoof a user's IP, in order to bypass remote address checks. PATCH NOTE: For user IPs to be checked (and logged) accurately after this patch is applied, sites using multiple levels of reverse proxies/balancers that append to the X-Forwarded-For header will need to configure the new " reverseproxyignore " setting. This ensures the IPs of the later proxies are ignored in favour of the user's IP. Severity/Risk: Serious Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versions Versions fixed: 3.8.2, 3.7.5, 3.6.9 and 3.5.11 Reported by: Brendan Heywood CVE identifier: CVE-2020-1755 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67861 Tracker issue: MDL-67861 IP addresses can be spoofed using X-Forwarded-For - -------------------------------------------------------------------------------- MSA-20-0004: Admin PHP unit webrunner tool requires additional input escaping Insufficient input escaping was applied to the PHP unit webrunner admin tool. NOTE: It is important to note that this update is only flagged as a precautionary measure, as it may provide limited CLI access to Moodle site admins. This may be considered a security risk in circumstances where admins do not ordinarily have access to the server CLI and/or in some hosting situations where site admins are not considered trusted users. This tool will also be removed entirely from Moodle 3.9. Severity/Risk: Minor Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and earlier unsupported versions Versions fixed: 3.8.2, 3.7.5, 3.6.9 and 3.5.11 Reported by: Brendan Heywood CVE identifier: CVE-2020-1756 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67726 Tracker issue: MDL-67726 Admin PHP unit webrunner tool requires additional input escaping - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBXnBLl2aOgq3Tt24GAQjxEw//Qf+dhvk0EEXvx5IZUkb81e1yU8LmSd3/ 2B5Mg116dPP23aCN1Sb8I1GKxNr5wFb6j8HDbalEhIcae+uf0MYQwb4Ne5zVePxE /GwT/sTzwo1wTUEfF9vi+O/FQiIF57WHUEUkVrOhjNYCoTgatoFlW+vCUiFunmR0 dzn6IWBsAcYzBvxWEK0dL3sqy2ENCOwYczpyf9fy3/zvI1cpR8DYWWHKakS2ex2+ OubWrnShRTDM8oNzqyqWHnCUMbL8F5tRerqlUH4efdV9C4UvxHab8jTnB/BgfCm3 VVkdmp71CNWv0yGrvr61BzZ61Zgvu8eCs6tIFDNjviDv26r56seBSxi6r5gjc1+d sqcXcL50mGDRGTPvgh3JMUSfn+beQIfXzFX/8UC3L+sj2sVSJE/RXkW+Btpe688W WWRU1Sa3INJwADPma4va0X8OIY6g9SgrHYjpumqQfkRTTTNVAC+MI0Dn8FBkQta/ V/jHm98xkrHTCOH5e5+tgLOckncSzx+Xi/SkxUEZKVvw/sURO9U1gMCfEZKJ6PxN mS951pSvym0KJo3lN3xi1TleJ25742nmwEUXgu+k/8aFn+7pu5HfNV7mAhiTo8gD WwUecsInukg/JOsY0x8iITcq/0RRXXPVoZVipNhjTF/vhhvJVZJwVbXnKC0Lbuxo TQxNEUg88xU= =eleY -----END PGP SIGNATURE-----