===================================================================== CERT-Renater Note d'Information No. 2014/VULN192 _____________________________________________________________________ DATE : 15/09/2014 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S): Systems running Moodle versions prior to 2.7.2, 2.6.5. ====================================================================== https://moodle.org/mod/forum/discuss.php?d=269590 ______________________________________________________________________ MSA-14-0033: URL parameter injection in CAS authentication Michael de Raadt lundi 15 septembre 2014, 08:28 Description: A flaw in the third-party CAS library, utilised by Moodle, has been found, which could potentially allow unauthorised access and privilege escalation. Issue summary: Upgrade phpCAS to 1.3.3 or greater - security vulnerabilities Severity/Risk: Serious Versions affected: 2.7 to 2.7.1, 2.6 to 2.6.4, 2.5 to 2.5.7 and earlier unsupported versions Versions fixed: 2.7.2 and 2.6.5 (NOTE: A fix to 2.5 was not possible. CAS users with Moodle 2.5 or earlier are encouraged to upgrade to a more recent release.) Reported by: Eric Merrill Issue no.: MDL-46766 CVE identifier: CVE-2014-4172 Changes (master): http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-46766 ========================================================= Serveur de référence du CERT-Renater https://services.renater.fr/ssi/ ========================================================== + CERT-RENATER | tel : 01-53-94-20-44 + + 23 - 25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email: cert@support.renater.fr + ==========================================================