Moodle e-learning platform patches session hijack bug that led to pre-auth RCE

2 years ago 127
BOOK THIS SPACE FOR AD
ARTICLE AD

Adam Bannister 12 January 2022 at 12:32 UTC
Updated: 12 January 2022 at 12:42 UTC

Researchers disclose second critical flaw in authentication plugin

Moodle e-learning platform patches session hijack bug that led to pre-auth RCE

A session hijack vulnerability in the hugely popular e-learning platform Moodle enabled attackers to commandeer any user’s session and achieve remote code execution (RCE), security researchers have revealed.

Maintainers of the open source platform patched the critical flaw last year, thus protecting 213 million users in 241 countries and customers including Shell, Microsoft, and the London School of Economics.

The unauthenticated flaw (CVE-2021-40691) resides in Moodle’s Shibboleth identity management plugin due to “the over-usage of PHP’s function when the database session handler was configured”, according to a blog post published by pen testers Robin Peraglie and Johannes Moritz on January 10.

The bug is contingent on Shibboleth authentication being enabled in Moodle.

Pre-auth RCE… the prequel

The findings build on another pre-auth RCE the researchers found in the same plugin last year that was triggered when sessions were stored in individual files, the default configuration for new installations.

RELATED Finders, cheaters: RCE bug in Moodle could be abused to steal data, manipulate exam results

As reported by The Daily Swig, that bug, which was patched in July 2021, meant attackers could access students’ data and test papers, and possibly even manipulate exam results.

Both vulnerabilities “stem from the attempts to re-implement or mess with PHP’s internal session mechanisms” – an inadvisable move “due to the complexity and pitfalls” involved, said the researchers.

Fraction of a second

The follow-up flaw related to how the function was invoked by every logout request received via a SOAP endpoint, iterated across all available database sessions and threw sessions into the function.

This decoded the database’s serialized session data and populated the superglobal with the decoded data – logging an attacker in as every user with an active session for a fraction of a second, said the researchers.

Since the last session was not unloaded, remained populated with the most recent user’s session information. This session was assigned to the attacker’s session cookie due to , so the attacker could refresh the page and hijack random user sessions.

Read more of the latest education security news

Attackers could logout to remove non-admin sessions from the database and repeat the attack until an admin session surfaced – paving the way to RCE via the plugin installer.

Triage trouble

The bug affects versions 3.11-3.11.2, 3.10-3.10.6, and 3.9-3.9.9 and was addressed in 3.11.3, 3.10.7, and 3.9.10.

They submitted the bug via Bugcrowd on February 21 and a patch was released on GitHub on September 12.

They described the reporting process as “extremely tedious due to problems when understanding and reproducing the issue on Bugcrowd’s side”. As with the previous bug, it took four months for the report to reach Moodle via triage.

YOU MAY ALSO LIKE Anti-cheating browser extension fails web security examination

Read Entire Article