[SECURITY] Fedora 20 Update: moodle-2.5.3-1.fc20

updates at fedoraproject.org updates at fedoraproject.org
Sun Nov 24 03:29:31 UTC 2013


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2013-21312
2013-11-14 18:48:44
--------------------------------------------------------------------------------

Name        : moodle
Product     : Fedora 20
Version     : 2.5.3
Release     : 1.fc20
URL         : http://moodle.org/
Summary     : A Course Management System
Description :
Moodle is a course management system (CMS) - a free, Open Source software
package designed using sound pedagogical principles, to help educators create
effective online learning communities.

--------------------------------------------------------------------------------
Update Information:

Latest upstreams, multiple security fixes.

Name: CVE-2013-6780
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6780
Assigned: 20131112
Reference: https://yuilibrary.com/support/20131111-vulnerability/

Cross-site scripting (XSS) vulnerability in uploader.swf in the
Uploader component in Yahoo! YUI 2.5.0 through 2.9.0 allows remote
attackers to inject arbitrary web script or HTML via the allowedDomain
parameter.

Name: CVE-2013-3630
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3630 [Open">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3630">Open URL]
Assigned: 20130521
Reference: https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one [Open">https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one">Open URL]
Reference: https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats [Open">https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats">Open URL]

Moodle through 2.5.2 allows remote authenticated administrators to execute arbitrary programs by configuring the aspell pathname and then triggering a spell-check operation within the TinyMCE editor.
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #1025655 - CVE-2013-3630 moodle: authenticated remote command execution [fedora-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1025655
  [ 2 ] Bug #1025656 - CVE-2013-3630 moodle: authenticated remote command execution [epel-all]
        https://bugzilla.redhat.com/show_bug.cgi?id=1025656
  [ 3 ] Bug #1030084 - CVE-2013-6780 moodle: XSS vulnerability in YUI 2.5.0 through 2.9.0 [epel-5]
        https://bugzilla.redhat.com/show_bug.cgi?id=1030084
  [ 4 ] Bug #1030085 - CVE-2013-6780 moodle: XSS vulnerability in YUI 2.5.0 through 2.9.0 [fedora-18]
        https://bugzilla.redhat.com/show_bug.cgi?id=1030085
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update moodle' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list