Security
Headlines
HeadlinesLatestCVEs

Source

ghsa

GHSA-5cvx-cwpx-9rjh: Moodle Code Injection vulnerability

In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.

ghsa
#vulnerability#web#git#rce
GHSA-jr83-8x65-xcr5: Moodle Exposure of Sensitive Information to an Unauthorized Actor vulnerability

Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.

GHSA-9gqp-3g28-w9xc: Moodle Cross-site Scripting vulnerability

The course upload preview contained an XSS risk for users uploading unsafe data.

GHSA-3xxm-3g3c-w579: Moodle Code Injection vulnerability

A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.

GHSA-w8x2-w4qr-v3x4: Moodle Code Injection vulnerability

A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.

GHSA-9724-h8p7-r3jv: Moodle Cross-site Scripting vulnerability

ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.

GHSA-8mm2-m2gp-c6x2: Moodle Improper Access Control vulnerability

Students in "Only see own membership" groups could see other students in the group, which should be hidden.

GHSA-28gc-4qq5-8q26: Moodle Cross-site Scripting vulnerability

The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.

GHSA-c35q-ffpf-5qpm: AsyncSSH Rogue Session Attack

### Summary An issue in AsyncSSH v2.14.0 and earlier allows attackers to control the remote end of an SSH client session via packet injection/removal and shell emulation. ### Details The rogue session attack targets any SSH client connecting to an AsyncSSH server, on which the attacker must have a shell account. The goal of the attack is to log the client into the attacker's account without the client being able to detect this. At that point, due to how SSH sessions interact with shell environments, the attacker has complete control over the remote end of the SSH session. The attacker receives all keyboard input by the user, completely controls the terminal output of the user's session, can send and receive data to/from forwarded network ports, and is able to create signatures with a forwarded SSH Agent, if any. The result is a complete break of the confidentiality and integrity of the secure channel, providing a strong vector for a targeted phishing campaign against the user. For e...

GHSA-3f38-96qm-r3fw: esptool allows attackers to view sensitive information via weak cryptographic algorithm

An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.