CVE-2023-23611

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-23611
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-23611.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-23611
Aliases
Published
2023-01-26T21:18:14Z
Modified
2024-06-06T14:17:30.839055Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

LTI Consumer XBlock implements the consumer side of the LTI specification enabling integration of third-party LTI provider tools. Versions 7.0.0 and above, prior to 7.2.2, are vulnerable to Missing Authorization. Any LTI tool that is integrated with on the Open edX platform can post a grade back for any LTI XBlock so long as it knows or can guess the block location for that XBlock. An LTI tool submits scores to the edX platform for line items. The code that uploads that score to the LMS grade tables determines which XBlock to upload the grades for by reading the resourcelinkid field of the associated line item. The LTI tool may submit any value for the resourcelinkid field, allowing a malicious LTI tool to submit scores for any LTI XBlock on the platform. The impact is a loss of integrity for LTI XBlock grades. This issue is patched in 7.2.2. No workarounds exist.

References

Affected packages

Git / github.com/openedx/xblock-lti-consumer

Affected ranges

Type
GIT
Repo
https://github.com/openedx/xblock-lti-consumer
Events

Affected versions

7.*

7.0.1
7.0.2
7.0.3
7.1.0
7.2.0
7.2.1

v7.*

v7.0.0