当前位置:网站首页>Moodle e-learning platform fixes the session hijacking error that leads to pre authorized rce
Moodle e-learning platform fixes the session hijacking error that leads to pre authorized rce
2022-06-23 08:08:00 【Khan security team】
A popular e-learning platform Moodle Session hijacking vulnerability in allows an attacker to commandeer any user's session and enable remote code execution (RCE).
last year , Maintainers of the open source platform have fixed this critical vulnerability , Thus protecting 241 A country's 2.13 Billion users and including shell 、 Microsoft and the London School of economics .
because “ Overused when configuring database session handlers PHP Of session_decode function ”, Unauthenticated flaws (CVE-2021-40691) Exist in Moodle Of Shibboleth Identity management plug-in .
The error depends on Moodle Enabled in Shibboleth Authentication .
These findings build on another preauthorization that researchers discovered in the same plug-in last year RCE above , The plug-in is triggered when the session is stored in a single file , This is the default configuration for new installations .
This bug, This is 2021 year 7 Monthly patch , This means that attackers can access student data and test papers , It may even manipulate exam results .
The researchers say , These two loopholes “ It all comes from trying to re - implement or destroy PHP Internal session mechanism of ”——“ Due to the complexity and pitfalls involved ”, This is an undesirable move .
Subsequent defects and logout_db_session() How functions are passed SOAP Each logout request received by the endpoint calls 、 Traverse all available database sessions and throw the session to session_decode Function about .
Researchers say , This decodes the serialized session data of the database , And fill with decoded data $_SESSION Super global variable —— Treat the attacker as a login with an active session per user for a fraction of a second .
Because the last session was not uninstalled ,$_SESSION It is still populated with the latest user session information . because session_decode, The session is assigned to the attacker's session cookie , Therefore, an attacker can refresh the page and hijack a random user session .
An attacker can log off to delete non administrator sessions from the database and repeat the attack , Until the administrator session surfaced —— Through the plug-in installer, you can RCE Pave the way .
This error affects version 3.11-3.11.2、3.10-3.10.6 and 3.9-3.9.9, And in 3.11.3、3.10.7 and 3.9.10 To be solved .
They are 2 month 21 Passed by Bugcrowd The error was committed , and On 9 month 12 in GitHub A patch has been released on .
边栏推荐
- INT 104_LEC 06
- @Controller和@RestController的区别?
- Socket programming -- select model
- 深度学习------不同方法实现vgg16
- 华为云服务器弹性公网IP无法ping
- socket编程(多线程)
- 图像分割-改进网络结构
- Vulnhub | DC: 3 |【实战】
- 深度学习------不同方法实现lenet-5模型
- Create an orderly sequence table and perform the following operations: 1 Insert element x into the table and keep it in order; 2. find the element with the value of X, and delete it if found; 3. outpu
猜你喜欢

如何在conda虚拟环境开启jupyter-notebook

Does huangrong really exist?

开源软件、自由软件、Copyleft、CC都是啥,傻傻分不清楚?

imperva-查找正则匹配超时的方法

Structure and usage of transform

Introduction to Excel VBA and practical examples

Create an orderly sequence table and perform the following operations: 1 Insert element x into the table and keep it in order; 2. find the element with the value of X, and delete it if found; 3. outpu

深度学习------不同方法实现lenet-5模型

vtk. JS left mouse button sliding to change window level and window width

ArcMap批量删除距离较近的点
随机推荐
Odoo project sends information to wechat official account or enterprise wechat
生产环境服务器环境搭建+项目发布流程
Commonly used bypass methods for SQL injection -ctf
观察者模式
Markdown learning
爬虫框架
GTEST death test
顺序表课设
Microsoft Exchange – prevent network attacks
一秒钟查看一次文件,并将文件最后一行内容结果发送至syslog服务器
firewalld 配置文件的位置
深度学习------不同方法实现lenet-5模型
Leetcode 173 Binary search tree iterator (2022.06.22)
记一次高校学生账户的“从无到有”
帆软堆积图显示占比
Imperva- method of finding regular match timeout
C#重启应用程序
On ThreadLocal and inheritablethreadlocal, source code analysis
How do I install MySQL on my computer?
Gif verification code analysis