MSA-20-0005: MathJax URL upgraded to later version to remove XSS risk (upstream)

by Michael Hawkins.  

MathJax versions 2.7.2 and earlier contain a stored XSS risk. The MathJax URL has been updated to reference a newer version, which has the vulnerability patched.


...
Severity/Risk:Serious
Versions affected:3.8 to 3.8.2, 3.7 to 3.7.5, 3.6 to 3.6.9, 3.5 to 3.5.11 and earlier unsupported versions
Versions fixed:3.8.3, 3.7.6, 3.6.10
Leer más...

MSA-20-0004: Admin PHP unit webrunner tool requires additional input escaping

by Michael Hawkins.  

Insufficient input escaping was applied to the PHP unit webrunner admin tool.

NOTE: It is important to note that this update is only flagged as a precautionary measure, as it may provide limited CLI access to Moodle site admins. This may be considered a security risk in circumstances where admins do not ordinarily have...

Leer más...

MSA-20-0003: IP addresses can be spoofed using X-Forwarded-For

by Michael Hawkins.  

X-Forwarded-For headers could be used to spoof a user's IP, in order to bypass remote address checks.

PATCH NOTE: For user IPs to be checked (and logged) accurately after this patch is applied, sites using multiple levels of reverse proxies/balancers that append to the X-Forwarded-For header will need to configure the new "...

Leer más...