vuln-list-alt/oval/p9/ALT-PU-2019-2843/definitions.json
2024-02-14 09:47:22 +00:00

206 lines
9.0 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20192843",
"Version": "oval:org.altlinux.errata:def:20192843",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-2843: package `moodle` update to version 3.7.2-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-2843",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2843",
"Source": "ALTPU"
},
{
"RefID": "CVE-2019-14827",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14827",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14828",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14828",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14829",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14829",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14830",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14831",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14831",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14881",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14881",
"Source": "CVE"
},
{
"RefID": "CVE-2020-1692",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-1692",
"Source": "CVE"
}
],
"Description": "This update upgrades moodle to version 3.7.2-alt2. \nSecurity Fix(es):\n\n * CVE-2019-14827: A vulnerability was found in Moodle where javaScript injection was possible in some Mustache templates via recursive rendering from contexts. Mustache helper tags that were included in template contexts were not being escaped before that context was injected into another Mustache helper, which could result in script injection in some templates. This affects versions 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions.\n\n * CVE-2019-14828: A vulnerability was found in Moodle affecting 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where users with the capability to create courses were assigned as a teacher in those courses, regardless of whether they had the capability to be automatically assigned that role.\n\n * CVE-2019-14829: A vulnerability was found in Moodle affection 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions where activity creation capabilities were not correctly respected when selecting the activity to use for a course in single activity mode.\n\n * CVE-2019-14830: A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where the mobile launch endpoint contained an open redirect in some circumstances, which could result in a user's mobile access token being exposed. (Note: This does not affect sites with a forced URL scheme configured, mobile service disabled, or where the mobile app login method is \"via the app\").\n\n * CVE-2019-14831: A vulnerability was found in Moodle 3.7 to 3.7.1, 3.6 to 3.6.5, 3.5 to 3.5.7 and earlier unsupported versions, where forum subscribe link contained an open redirect if forced subscription mode was enabled. If a forum's subscription mode was set to \"forced subscription\", the forum's subscribe link contained an open redirect.\n\n * CVE-2019-14881: A vulnerability was found in moodle 3.7 before 3.7.3, where there is blind XSS reflected in some locations where user email is displayed.\n\n * CVE-2020-1692: Moodle before version 3.7.2 is vulnerable to information exposure of service tokens for users enrolled in the same course.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Low",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-10-09"
},
"Updated": {
"Date": "2019-10-09"
},
"bdu": null,
"Cves": [
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-94",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14827",
"Impact": "Low",
"Public": "20210517",
"CveID": "CVE-2019-14827"
},
{
"Cvss": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"Cwe": "CWE-285",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14828",
"Impact": "Low",
"Public": "20210319",
"CveID": "CVE-2019-14828"
},
{
"Cvss": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"Cwe": "CWE-573",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14829",
"Impact": "Low",
"Public": "20210319",
"CveID": "CVE-2019-14829"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-601",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14830",
"Impact": "Low",
"Public": "20210319",
"CveID": "CVE-2019-14830"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-601",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14831",
"Impact": "Low",
"Public": "20210319",
"CveID": "CVE-2019-14831"
},
{
"Cvss": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"Cwe": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14881",
"Impact": "Low",
"Public": "20200318",
"CveID": "CVE-2019-14881"
},
{
"Cvss": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"Cvss3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"Cwe": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-1692",
"Impact": "Low",
"Public": "20200217",
"CveID": "CVE-2020-1692"
}
],
"AffectedCpeList": {
"Cpe": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20192843001",
"Comment": "moodle is earlier than 0:3.7.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192843002",
"Comment": "moodle-apache2 is earlier than 0:3.7.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192843003",
"Comment": "moodle-base is earlier than 0:3.7.2-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192843004",
"Comment": "moodle-local-mysql is earlier than 0:3.7.2-alt2"
}
]
}
]
}
}
]
}