Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.FEDORA_2023-D9C13996B2.NASL
HistoryMar 30, 2023 - 12:00 a.m.

Fedora 36 : moodle (2023-d9c13996b2)

2023-03-3000:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
12
fedora 36
moodle
sql injection
arbitrary file read
xss
information disclosure

0.003 Low

EPSS

Percentile

70.7%

The remote Fedora 36 host has a package installed that is affected by multiple vulnerabilities as referenced in the FEDORA-2023-d9c13996b2 advisory.

  • Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers). (CVE-2023-28329)

  • Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default. (CVE-2023-28330)

  • Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
    (CVE-2023-28331)

  • If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk. (CVE-2023-28332)

  • The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note:
    This did not appear to be implemented/exploitable anywhere in the core Moodle LMS). (CVE-2023-28333)

  • Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access. (CVE-2023-28336)

  • The course participation report required additional checks to prevent roles being displayed which the user did not have access to view. (CVE-2023-1402)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2023-d9c13996b2
#

include('compat.inc');

if (description)
{
  script_id(173675);
  script_version("1.1");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/04/03");

  script_cve_id(
    "CVE-2023-1402",
    "CVE-2023-28329",
    "CVE-2023-28330",
    "CVE-2023-28331",
    "CVE-2023-28332",
    "CVE-2023-28333",
    "CVE-2023-28336"
  );
  script_xref(name:"FEDORA", value:"2023-d9c13996b2");

  script_name(english:"Fedora 36 : moodle (2023-d9c13996b2)");

  script_set_attribute(attribute:"synopsis", value:
"The remote Fedora host is missing one or more security updates.");
  script_set_attribute(attribute:"description", value:
"The remote Fedora 36 host has a package installed that is affected by multiple vulnerabilities as referenced in the
FEDORA-2023-d9c13996b2 advisory.

  - Insufficient validation of profile field availability condition resulted in an SQL injection risk (by
    default only available to teachers and managers). (CVE-2023-28329)

  - Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this
    feature is only available to teachers, managers and admins by default. (CVE-2023-28330)

  - Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.
    (CVE-2023-28331)

  - If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the
    server), it presented an XSS risk. (CVE-2023-28332)

  - The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note:
    This did not appear to be implemented/exploitable anywhere in the core Moodle LMS). (CVE-2023-28333)

  - Insufficient filtering of grade report history made it possible for teachers to access the names of users
    they could not otherwise access. (CVE-2023-28336)

  - The course participation report required additional checks to prevent roles being displayed which the user
    did not have access to view. (CVE-2023-1402)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://bodhi.fedoraproject.org/updates/FEDORA-2023-d9c13996b2");
  script_set_attribute(attribute:"solution", value:
"Update the affected moodle package.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-28333");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/03/21");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/03/21");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/03/30");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:36");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:moodle");
  script_set_attribute(attribute:"generated_plugin", value:"current");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Fedora Local Security Checks");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");

  exit(0);
}


include('rpm.inc');

if (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
var os_release = get_kb_item('Host/RedHat/release');
if (isnull(os_release) || 'Fedora' >!< os_release) audit(AUDIT_OS_NOT, 'Fedora');
var os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:os_release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Fedora');
os_ver = os_ver[1];
if (! preg(pattern:"^36([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, 'Fedora 36', 'Fedora ' + os_ver);

if (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);

var cpu = get_kb_item('Host/cpu');
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ('x86_64' >!< cpu && cpu !~ "^i[3-6]86$" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Fedora', cpu);

var pkgs = [
    {'reference':'moodle-3.11.13-1.fc36', 'release':'FC36', 'rpm_spec_vers_cmp':TRUE}
];

var flag = 0;
foreach package_array ( pkgs ) {
  var reference = NULL;
  var _release = NULL;
  var sp = NULL;
  var _cpu = NULL;
  var el_string = NULL;
  var rpm_spec_vers_cmp = NULL;
  var epoch = NULL;
  var allowmaj = NULL;
  if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];
  if (!empty_or_null(package_array['release'])) _release = package_array['release'];
  if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];
  if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];
  if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];
  if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];
  if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];
  if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];
  if (reference && _release) {
    if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;
  }
}

if (flag)
{
  security_report_v4(
      port       : 0,
      severity   : SECURITY_HOLE,
      extra      : rpm_report_get()
  );
  exit(0);
}
else
{
  var tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'moodle');
}
VendorProductVersionCPE
fedoraprojectfedora36cpe:/o:fedoraproject:fedora:36
fedoraprojectfedoramoodlep-cpe:/a:fedoraproject:fedora:moodle

0.003 Low

EPSS

Percentile

70.7%