MSA-21-0005: Arbitrary PHP code execution by site admins via Shibboleth configuration

by Michael Hawkins.  

It was possible for site administrators to execute arbitrary PHP scripts via a PHP include used during Shibboleth authentication.


Severity/Risk:Serious
Versions affected:3.10, 3.9 to 3.9.3, 3.8 to 3.8.6, 3.5 to 3.5.15 and earlier unsupported versions
Versions fixed:3.10.1, 3.9.4, 3.8.7 and 3.5.16
Reported by:Frédéric Massart
Workaround:Harcode preventexecpath to true in config.php, which prevents site administrators setting some executable paths via the UI. See https://docs.moodle.org/310/en/report/security/report_security_check_preventexecpath for more details.
CVE identifier:CVE-2021-20187
Changes (master):http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68486
Tracker issue:MDL-68486 Arbitrary PHP code execution by site admins via Shibboleth configuration

Read more https://moodle.org/mod/forum/discuss.php?d=417171&parent=1680847