-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0939
          Multiple vulnerabilities have been identified in Moodle
                               17 March 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Moodle
Publisher:         Moodle
Operating System:  Windows
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Provide Misleading Information -- Existing Account
                   Unauthorised Access            -- Existing Account
                   Reduced Security               -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-1756 CVE-2020-1755 CVE-2020-1754

Original Bulletin: 
   https://moodle.org/mod/forum/discuss.php?d=398350&parent=1606854
   https://moodle.org/mod/forum/discuss.php?d=398351&parent=1606855
   https://moodle.org/mod/forum/discuss.php?d=398352&parent=1606856

Comment: This bulletin contains three (3) Moodle security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

MSA-20-0002: Grade history report does not respect Separate groups mode in the
course settings

Users viewing the grade history report without the 'access all groups'
capability were not restricted to viewing grades of users within their own
groups.

Severity/Risk:     Minor
Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and
                  earlier unsupported versions
Versions fixed:    3.8.2, 3.7.5, 3.6.9 and 3.5.11
Reported by:       Tim Hunt
CVE identifier:    CVE-2020-1754
Changes (master):  http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-56287
Tracker issue:     MDL-56287 Grade history report does not respect Separate
                   groups mode in the course settings

- --------------------------------------------------------------------------------

MSA-20-0003: IP addresses can be spoofed using X-Forwarded-For

X-Forwarded-For headers could be used to spoof a user's IP, in order to bypass
remote address checks.

PATCH NOTE: For user IPs to be checked (and logged) accurately after this patch
is applied, sites using multiple levels of reverse proxies/balancers that
append to the X-Forwarded-For header will need to configure the new "
reverseproxyignore " setting. This ensures the IPs of the later proxies are
ignored in favour of the user's IP.

Severity/Risk:     Serious
Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and
                  earlier unsupported versions
Versions fixed:    3.8.2, 3.7.5, 3.6.9 and 3.5.11
Reported by:       Brendan Heywood
CVE identifier:    CVE-2020-1755
Changes (master):  http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67861
Tracker issue:     MDL-67861 IP addresses can be spoofed using X-Forwarded-For

- --------------------------------------------------------------------------------

MSA-20-0004: Admin PHP unit webrunner tool requires additional input escaping

Insufficient input escaping was applied to the PHP unit webrunner admin tool.

NOTE: It is important to note that this update is only flagged as a
precautionary measure, as it may provide limited CLI access to Moodle site
admins. This may be considered a security risk in circumstances where admins do
not ordinarily have access to the server CLI and/or in some hosting situations
where site admins are not considered trusted users. This tool will also be
removed entirely from Moodle 3.9.

Severity/Risk:     Minor
Versions affected: 3.8 to 3.8.1, 3.7 to 3.7.4, 3.6 to 3.6.8, 3.5 to 3.5.10 and
                  earlier unsupported versions
Versions fixed:    3.8.2, 3.7.5, 3.6.9 and 3.5.11
Reported by:       Brendan Heywood
CVE identifier:    CVE-2020-1756
Changes (master):  http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-67726
Tracker issue:     MDL-67726 Admin PHP unit webrunner tool requires additional
                  input escaping

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=eleY
-----END PGP SIGNATURE-----