2024-12-12 21:07:30 +00:00

536 lines
27 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20232012",
"Version": "oval:org.altlinux.errata:def:20232012",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-2012: package `moodle` update to version 3.11.15-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-2012",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-2012",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-06359",
"RefURL": "https://bdu.fstec.ru/vul/2022-06359",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06382",
"RefURL": "https://bdu.fstec.ru/vul/2022-06382",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06383",
"RefURL": "https://bdu.fstec.ru/vul/2022-06383",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06402",
"RefURL": "https://bdu.fstec.ru/vul/2022-06402",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07405",
"RefURL": "https://bdu.fstec.ru/vul/2022-07405",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07406",
"RefURL": "https://bdu.fstec.ru/vul/2022-07406",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07407",
"RefURL": "https://bdu.fstec.ru/vul/2022-07407",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07408",
"RefURL": "https://bdu.fstec.ru/vul/2022-07408",
"Source": "BDU"
},
{
"RefID": "BDU:2023-03462",
"RefURL": "https://bdu.fstec.ru/vul/2023-03462",
"Source": "BDU"
},
{
"RefID": "CVE-2021-23414",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-23414",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0323",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0323",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2986",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2986",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40208",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40208",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40313",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40313",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40314",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40314",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40315",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40315",
"Source": "CVE"
},
{
"RefID": "CVE-2022-40316",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-40316",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45149",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45149",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45150",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45150",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45151",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45151",
"Source": "CVE"
},
{
"RefID": "CVE-2022-45152",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-45152",
"Source": "CVE"
},
{
"RefID": "CVE-2023-1402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1402",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23921",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23921",
"Source": "CVE"
},
{
"RefID": "CVE-2023-23923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-23923",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28329",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28329",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28330",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28330",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28331",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28331",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28332",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28332",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28333",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28333",
"Source": "CVE"
},
{
"RefID": "CVE-2023-28336",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-28336",
"Source": "CVE"
},
{
"RefID": "CVE-2023-30944",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-30944",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35131",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35131",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35132",
"Source": "CVE"
},
{
"RefID": "CVE-2023-35133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-35133",
"Source": "CVE"
}
],
"Description": "This update upgrades moodle to version 3.11.15-alt1. \nSecurity Fix(es):\n\n * BDU:2022-06359: Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной очисткой пользовательских данных, позволяющая нарушителю выполнить произвольные SQL-команды\n\n * BDU:2022-06382: Уязвимость плагина H5P виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-06383: Уязвимость виртуальной обучающей среды Moodle, связанная с восстановлением в памяти недостоверных данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-06402: Уязвимость реализации функции рекурсивного рендеринга компонента Mustache helpers системы шаблонов Mustache template system виртуальной обучающей среды Moodle, позволяющая нарушителю проводить межсайтовые сценарные атаки или вызвать отказ в обслуживании\n\n * BDU:2022-07405: Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой источника HTTP-запроса в URL-адресе перенаправления курса, позволяющая нарушителю выполнять атаки с подделкой межсайтовых запросов\n\n * BDU:2022-07406: Уязвимость системы управления курсами Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)\n\n * BDU:2022-07407: Уязвимость системы управления курсами Moodle, связанная с недостаточной очисткой пользовательских данных в нескольких «социальных» полях профиля пользователя, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев (XSS)\n\n * BDU:2022-07408: Уязвимость системы управления курсами Moodle, связанная с недостаточной проверкой введенных пользователем данных в библиотеке поставщика LTI, позволяющая нарушителю выполнять SSRF-атаки\n\n * BDU:2023-03462: Уязвимость виртуальной обучающей среды Moodle, связанная с неправильным контролем доступа, позволяющая нарушителю получить несанкционированный доступ к ограниченным функциям\n\n * CVE-2021-23414: This affects the package video.js before 7.14.3. The src attribute of track tag allows to bypass HTML escaping and execute arbitrary code.\n\n * CVE-2022-0323: Improper Neutralization of Special Elements Used in a Template Engine in Packagist mustache/mustache prior to 2.14.1.\n\n * CVE-2022-2986: Enabling and disabling installed H5P libraries did not include the necessary token to prevent a CSRF risk.\n\n * CVE-2022-40208: In Moodle, insufficient limitations in some quiz web services made it possible for students to bypass sequential navigation during a quiz attempt.\n\n * CVE-2022-40313: Recursive rendering of Mustache template helpers containing user input could, in some cases, result in an XSS risk or a page failing to load.\n\n * CVE-2022-40314: A remote code execution risk when restoring backup files originating from Moodle 1.9 was identified.\n\n * CVE-2022-40315: A limited SQL injection risk was identified in the \"browse list of users\" site administration page.\n\n * CVE-2022-40316: The H5P activity attempts report did not filter by groups, which in separate groups mode could reveal information to non-editing teachers about attempts/users in groups they should not have access to.\n\n * CVE-2022-45149: A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website. This flaw allows an attacker to perform cross-site request forgery attacks.\n\n * CVE-2022-45150: A reflected cross-site scripting vulnerability was discovered in Moodle. This flaw exists due to insufficient sanitization of user-supplied data in policy tool. An attacker can trick the victim to open a specially crafted link that executes an arbitrary HTML and script code in user's browser in context of vulnerable website. This vulnerability may allow an attacker to perform cross-site scripting (XSS) attacks to gain access potentially sensitive information and modification of web pages.\n\n * CVE-2022-45151: The stored-XSS vulnerability was discovered in Moodle which exists due to insufficient sanitization of user-supplied data in several \"social\" user profile fields. An attacker could inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.\n\n * CVE-2022-45152: A blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle. This flaw exists due to insufficient validation of user-supplied input in LTI provider library. The library does not utilise Moodle's inbuilt cURL helper, which resulted in a blind SSRF risk. An attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems. This vulnerability allows a remote attacker to perform SSRF attacks.\n\n * CVE-2023-1402: The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.\n\n * CVE-2023-23921: The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.\n\n * CVE-2023-23923: The vulnerability was found Moodle which exists due to insufficient limitations on the \"start page\" preference. A remote attacker can set that preference for another user. The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.\n\n * CVE-2023-28329: Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available to teachers and managers).\n\n * CVE-2023-28330: Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access this feature is only available to teachers, managers and admins by default.\n\n * CVE-2023-28331: Content output by the database auto-linking filter required additional sanitizing to prevent an XSS risk.\n\n * CVE-2023-28332: If the algebra filter was enabled but not functional (eg the necessary binaries were missing from the server), it presented an XSS risk.\n\n * CVE-2023-28333: The Mustache pix helper contained a potential Mustache injection risk if combined with user input (note: This did not appear to be implemented/exploitable anywhere in the core Moodle LMS).\n\n * CVE-2023-28336: Insufficient filtering of grade report history made it possible for teachers to access the names of users they could not otherwise access.\n\n * CVE-2023-30944: The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.\n\n * CVE-2023-35131: Content on the groups page required additional sanitizing to prevent an XSS risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8 and 3.11 to 3.11.14.\n\n * CVE-2023-35132: A limited SQL injection risk was identified on the Mnet SSO access control page. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.\n\n * CVE-2023-35133: An issue in the logic used to check 0.0.0.0 against the cURL blocked hosts lists resulted in an SSRF risk. This flaw affects Moodle versions 4.2, 4.1 to 4.1.3, 4.0 to 4.0.8, 3.11 to 3.11.14, 3.9 to 3.9.21 and earlier unsupported versions.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-06-16"
},
"Updated": {
"Date": "2023-06-16"
},
"BDUs": [
{
"ID": "BDU:2022-06359",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://bdu.fstec.ru/vul/2022-06359",
"Impact": "Critical",
"Public": "20220808"
},
{
"ID": "BDU:2022-06382",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-264, CWE-668",
"Href": "https://bdu.fstec.ru/vul/2022-06382",
"Impact": "Low",
"Public": "20220118"
},
{
"ID": "BDU:2022-06383",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-502",
"Href": "https://bdu.fstec.ru/vul/2022-06383",
"Impact": "Critical",
"Public": "20220808"
},
{
"ID": "BDU:2022-06402",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2022-06402",
"Impact": "High",
"Public": "20220819"
},
{
"ID": "BDU:2022-07405",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-352",
"Href": "https://bdu.fstec.ru/vul/2022-07405",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "BDU:2022-07406",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2022-07406",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "BDU:2022-07407",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2022-07407",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "BDU:2022-07408",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-918",
"Href": "https://bdu.fstec.ru/vul/2022-07408",
"Impact": "Critical",
"Public": "20221123"
},
{
"ID": "BDU:2023-03462",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2023-03462",
"Impact": "High",
"Public": "20230217"
}
],
"CVEs": [
{
"ID": "CVE-2021-23414",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-23414",
"Impact": "Low",
"Public": "20210728"
},
{
"ID": "CVE-2022-0323",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0323",
"Impact": "High",
"Public": "20220121"
},
{
"ID": "CVE-2022-2986",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2986",
"Impact": "High",
"Public": "20221006"
},
{
"ID": "CVE-2022-40208",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40208",
"Impact": "Low",
"Public": "20230324"
},
{
"ID": "CVE-2022-40313",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40313",
"Impact": "High",
"Public": "20220930"
},
{
"ID": "CVE-2022-40314",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40314",
"Impact": "Critical",
"Public": "20220930"
},
{
"ID": "CVE-2022-40315",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40315",
"Impact": "Critical",
"Public": "20220930"
},
{
"ID": "CVE-2022-40316",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-40316",
"Impact": "Low",
"Public": "20220930"
},
{
"ID": "CVE-2022-45149",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-352",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45149",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "CVE-2022-45150",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45150",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "CVE-2022-45151",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45151",
"Impact": "Low",
"Public": "20221123"
},
{
"ID": "CVE-2022-45152",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"CWE": "CWE-918",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-45152",
"Impact": "Critical",
"Public": "20221125"
},
{
"ID": "CVE-2023-1402",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1402",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-23921",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23921",
"Impact": "Low",
"Public": "20230217"
},
{
"ID": "CVE-2023-23923",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-23923",
"Impact": "High",
"Public": "20230217"
},
{
"ID": "CVE-2023-28329",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28329",
"Impact": "High",
"Public": "20230323"
},
{
"ID": "CVE-2023-28330",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28330",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-28331",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28331",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-28332",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28332",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-28333",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28333",
"Impact": "Critical",
"Public": "20230323"
},
{
"ID": "CVE-2023-28336",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-668",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-28336",
"Impact": "Low",
"Public": "20230323"
},
{
"ID": "CVE-2023-30944",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-30944",
"Impact": "High",
"Public": "20230502"
},
{
"ID": "CVE-2023-35131",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35131",
"Impact": "Low",
"Public": "20230622"
},
{
"ID": "CVE-2023-35132",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-89",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35132",
"Impact": "Low",
"Public": "20230622"
},
{
"ID": "CVE-2023-35133",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-918",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-35133",
"Impact": "High",
"Public": "20230622"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20232012001",
"Comment": "moodle is earlier than 0:3.11.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20232012002",
"Comment": "moodle-apache2 is earlier than 0:3.11.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20232012003",
"Comment": "moodle-base is earlier than 0:3.11.15-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20232012004",
"Comment": "moodle-local-mysql is earlier than 0:3.11.15-alt1"
}
]
}
]
}
}
]
}