112 lines
4.7 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2023-23611",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-01-26T21:18:14.497",
"lastModified": "2023-11-07T04:07:49.577",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "LTI Consumer XBlock implements the consumer side of the LTI specification enabling integration of third-party LTI provider tools. Versions 7.0.0 and above, prior to 7.2.2, are vulnerable to Missing Authorization. Any LTI tool that is integrated with on the Open edX platform can post a grade back for any LTI XBlock so long as it knows or can guess the block location for that XBlock. An LTI tool submits scores to the edX platform for line items. The code that uploads that score to the LMS grade tables determines which XBlock to upload the grades for by reading the resource_link_id field of the associated line item. The LTI tool may submit any value for the resource_link_id field, allowing a malicious LTI tool to submit scores for any LTI XBlock on the platform. The impact is a loss of integrity for LTI XBlock grades. This issue is patched in 7.2.2. No workarounds exist."
},
{
"lang": "es",
"value": "LTI Consumer XBlock implementa el lado del consumidor de la especificaci\u00f3n LTI, lo que permite la integraci\u00f3n de herramientas de proveedores de LTI de terceros. Las versiones 7.0.0 y superiores, anteriores a la 7.2.2, son vulnerables a la falta de autorizaci\u00f3n. Cualquier herramienta LTI integrada en la plataforma Open edX puede publicar una calificaci\u00f3n para cualquier LTI XBlock siempre que sepa o pueda adivinar la ubicaci\u00f3n del bloque para ese XBlock. Una herramienta LTI env\u00eda puntuaciones a la plataforma edX para l\u00edneas de pedido. El c\u00f3digo que carga esa puntuaci\u00f3n en las tablas de calificaciones del LMS determina para qu\u00e9 XBlock cargar las calificaciones leyendo el campo Resource_link_id de la l\u00ednea de pedido asociada. La herramienta LTI puede enviar cualquier valor para el campo Resource_link_id, lo que permite que una herramienta LTI maliciosa env\u00ede puntuaciones para cualquier LTI XBlock en la plataforma. El impacto es una p\u00e9rdida de integridad para los grados LTI XBlock. Este problema se solucion\u00f3 en 7.2.2. No existen workarounds."
2023-04-24 12:24:31 +02:00
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
2023-04-24 12:24:31 +02:00
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
2023-04-24 12:24:31 +02:00
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openedx:xblock-lti-consumer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.2.2",
"matchCriteriaId": "25C60DB7-AD9B-447E-86AA-BD0051F1C60B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/openedx/xblock-lti-consumer/security/advisories/GHSA-7j9p-67mm-5g87",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
}
]
}