当前位置:网站首页>Moodle e-learning platform fixes the session hijacking error that leads to pre authorized rce
Moodle e-learning platform fixes the session hijacking error that leads to pre authorized rce
2022-06-23 08:08:00 【Khan security team】
A popular e-learning platform Moodle Session hijacking vulnerability in allows an attacker to commandeer any user's session and enable remote code execution (RCE).
last year , Maintainers of the open source platform have fixed this critical vulnerability , Thus protecting 241 A country's 2.13 Billion users and including shell 、 Microsoft and the London School of economics .
because “ Overused when configuring database session handlers PHP Of session_decode function ”, Unauthenticated flaws (CVE-2021-40691) Exist in Moodle Of Shibboleth Identity management plug-in .
The error depends on Moodle Enabled in Shibboleth Authentication .
These findings build on another preauthorization that researchers discovered in the same plug-in last year RCE above , The plug-in is triggered when the session is stored in a single file , This is the default configuration for new installations .
This bug, This is 2021 year 7 Monthly patch , This means that attackers can access student data and test papers , It may even manipulate exam results .
The researchers say , These two loopholes “ It all comes from trying to re - implement or destroy PHP Internal session mechanism of ”——“ Due to the complexity and pitfalls involved ”, This is an undesirable move .
Subsequent defects and logout_db_session() How functions are passed SOAP Each logout request received by the endpoint calls 、 Traverse all available database sessions and throw the session to session_decode Function about .
Researchers say , This decodes the serialized session data of the database , And fill with decoded data $_SESSION Super global variable —— Treat the attacker as a login with an active session per user for a fraction of a second .
Because the last session was not uninstalled ,$_SESSION It is still populated with the latest user session information . because session_decode, The session is assigned to the attacker's session cookie , Therefore, an attacker can refresh the page and hijack a random user session .
An attacker can log off to delete non administrator sessions from the database and repeat the attack , Until the administrator session surfaced —— Through the plug-in installer, you can RCE Pave the way .
This error affects version 3.11-3.11.2、3.10-3.10.6 and 3.9-3.9.9, And in 3.11.3、3.10.7 and 3.9.10 To be solved .
They are 2 month 21 Passed by Bugcrowd The error was committed , and On 9 month 12 in GitHub A patch has been released on .
边栏推荐
- Use of tensorboard
- MySQL slow query record
- GTEST死亡测试
- Vulnhub | DC: 3 |【实战】
- Odoo project sends information to wechat official account or enterprise wechat
- 2 corrections de bogues dans l'outil aquatone
- Using jetpack datastore for data storage
- Deep learning ----- different methods to implement lenet-5 model
- YGG Spain subdao Ola GG officially established
- Deep learning ----- different methods to realize vgg16
猜你喜欢
随机推荐
生产环境服务器环境搭建+项目发布流程
Check the file through the port
socket编程——select模型
Mathematical knowledge: fast power fast power
Use of tensorboard
深度学习------不同方法实现lenet-5模型
C#打印缩放
Regular expression use cases
Structure and usage of transform
AVL树的实现
记一次高校学生账户的“从无到有”
Socket programming (multi process)
GTEST death test
imperva-查找正则匹配超时的方法
黄蓉真的存在吗?
ThreadPoolExecutor线程池实现原理与源码解析
Create an orderly sequence table and perform the following operations: 1 Insert element x into the table and keep it in order; 2. find the element with the value of X, and delete it if found; 3. outpu
Two bug fixes in aquatone tool
Markdown学习
Analysis of open API design specification









