Ubuntu 8.04 LTS / 8.10 : moodle vulnerabilities (USN-791-1)

Ubuntu Security Notice (C) 2009-2013 Canonical, Inc. / NASL script (C) 2009-2013 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Thor Larholm discovered that PHPMailer, as used by Moodle, did not
correctly escape email addresses. A local attacker with direct access
to the Moodle database could exploit this to execute arbitrary
commands as the web server user. (CVE-2007-3215)

Nigel McNie discovered that fetching https URLs did not correctly
escape shell meta-characters. An authenticated remote attacker could
execute arbitrary commands as the web server user, if curl was
installed and configured. (CVE-2008-4796, MSA-09-0003)

It was discovered that Smarty (also included in Moodle), did not
correctly filter certain inputs. An authenticated remote attacker
could exploit this to execute arbitrary PHP commands as the web server
user. (CVE-2008-4810, CVE-2008-4811, CVE-2009-1669)

It was discovered that the unused SpellChecker extension in Moodle did
not correctly handle temporary files. If the tool had been locally
modified, it could be made to overwrite arbitrary local files via
symlinks. (CVE-2008-5153)

Mike Churchward discovered that Moodle did not correctly filter Wiki
page titles in certain areas. An authenticated remote attacker could
exploit this to cause cross-site scripting (XSS), which could be used
to modify or steal confidential data of other users within the same
web domain. (CVE-2008-5432, MSA-08-0022)

It was discovered that the HTML sanitizer, 'Login as' feature, and
logging in Moodle did not correctly handle certain inputs. An
authenticated remote attacker could exploit this to generate XSS,
which could be used to modify or steal confidential data of other
users within the same web domain. (CVE-2008-5619, CVE-2009-0500,
CVE-2009-0502, MSA-08-0026, MSA-09-0004, MSA-09-0007)

It was discovered that the HotPot module in Moodle did not correctly
filter SQL inputs. An authenticated remote attacker could execute
arbitrary SQL commands as the moodle database user, leading to a loss
of privacy or denial of service. (CVE-2008-6124, MSA-08-0010)

Kevin Madura discovered that the forum actions and messaging settings
in Moodle were not protected from cross-site request forgery (CSRF).
If an authenticated user were tricked into visiting a malicious
website while logged into Moodle, a remote attacker could change the
user's configurations or forum content. (CVE-2009-0499, MSA-09-0008,
MSA-08-0023)

Daniel Cabezas discovered that Moodle would leak usernames from the
Calendar Export tool. A remote attacker could gather a list of users,
leading to a loss of privacy. (CVE-2009-0501, MSA-09-0006)

Christian Eibl discovered that the TeX filter in Moodle allowed any
function to be used. An authenticated remote attacker could post a
specially crafted TeX formula to execute arbitrary TeX functions,
potentially reading any file accessible to the web server user,
leading to a loss of privacy. (CVE-2009-1171, MSA-09-0009)

Johannes Kuhn discovered that Moodle did not correctly validate user
permissions when attempting to switch user accounts. An authenticated
remote attacker could switch to any other Moodle user, leading to a
loss of privacy. (MSA-08-0003)

Hanno Boeck discovered that unconfigured Moodle instances contained
XSS vulnerabilities. An unauthenticated remote attacker could exploit
this to modify or steal confidential data of other users within the
same web domain. (MSA-08-0004)

Debbie McDonald, Mauno Korpelainen, Howard Miller, and Juan Segarra
Montesinos discovered that when users were deleted from Moodle, their
profiles and avatars were still visible. An authenticated remote
attacker could exploit this to store information in profiles even
after they were removed, leading to spam traffic. (MSA-08-0015,
MSA-09-0001, MSA-09-0002)

Lars Vogdt discovered that Moodle did not correctly filter certain
inputs. An authenticated remote attacker could exploit this to
generate XSS from which they could modify or steal confidential data
of other users within the same web domain. (MSA-08-0021)

It was discovered that Moodle did not correctly filter inputs for
group creation, mnet, essay question, HOST param, wiki param, and
others. An authenticated remote attacker could exploit this to
generate XSS from which they could modify or steal confidential data
of other users within the same web domain. (MDL-9288, MDL-11759,
MDL-12079, MDL-12793, MDL-14806)

It was discovered that Moodle did not correctly filter SQL inputs when
performing a restore. An attacker authenticated as a Moodle
administrator could execute arbitrary SQL commands as the moodle
database user, leading to a loss of privacy or denial of service.
(MDL-11857).

Solution :

Update the affected moodle package.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true