SynopsisThe remote web server is hosting a web application that is vulnerable to multiple attack vectors.
DescriptionThe remote web server hosts Moodle, an open-source course management system. Versions of Moodle 3.0.x prior to 3.0.8 are affected by mutliple vulnerabilities :
- A flaw exists that allows traversing outside of a restricted path. The issue is due to the 'lib/classes/scss.php' script not properly sanitizing user input, specifically path traversal style attacks (e.g. '../') supplied via file paths when including files in boost theme presets. With a specially crafted request, an authenticated, remote attacker can disclose the contents of arbitrary files. The fix only permits .scss files loaded from within the theme directory.
- A flaw exists that is triggered when forum post authors edit posts, as it is possible to change too many fields. This may allow an authenticated, remote attacker to unexpectedly manipulate certain fields.
- A flaw exists that allows a cross-site scripting (XSS) attack. This flaw exists because the assignment submission page does not validate certain input before returning it to users. This may allow a remote attacker to create a specially crafted request that would execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
SolutionUpgrade to Moodle version 3.0.8 or later.