In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://moodle.org/mod/forum/discuss.php?d=424799 | patch vendor advisory |