Tag
#git
In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user who also has direct access to the web server outside of the Moodle webroot could utilise a local file include to achieve remote code execution.
Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.
The course upload preview contained an XSS risk for users uploading unsafe data.
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.
ID numbers displayed in the quiz grading report required additional sanitizing to prevent a stored XSS risk.
Students in "Only see own membership" groups could see other students in the group, which should be hidden.
The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.
An issue has been discovered in GitLab EE affecting all versions starting from 15.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated.
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.