First published: Thu Jan 28 2021(Updated: )
It was found in Moodle before version 3.10.1, 3.9.4, 3.8.7 and 3.5.16 that it was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | >=3.10<3.10.1 | 3.10.1 |
composer/moodle/moodle | >=3.9<3.9.4 | 3.9.4 |
composer/moodle/moodle | >=3.8<3.8.7 | 3.8.7 |
composer/moodle/moodle | >=3.5<3.5.16 | 3.5.16 |
Moodle | <3.5.16 | |
Moodle | >=3.8.0<3.8.7 | |
Moodle | >=3.9.0<3.9.4 | |
Moodle | =3.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-20187 has a medium severity rating due to the potential for site administrators to execute arbitrary PHP scripts.
To fix CVE-2021-20187, update Moodle to version 3.10.1, 3.9.4, 3.8.7, or 3.5.16 or later.
Moodle versions prior to 3.10.1, 3.9.4, 3.8.7, and 3.5.16 are vulnerable to CVE-2021-20187.
Yes, site administrators can exploit CVE-2021-20187 to execute arbitrary PHP scripts through Shibboleth authentication.
No official workaround exists for CVE-2021-20187; the only mitigation is to upgrade to the patched versions.