Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS03ajlwLTY3bW0tNWc4N84AA_D0
LTI 1.3 Grade Pass Back Implementation has Missing Authorization Vulnerability
Problem
TL;DR: Any LTI tool that is integrated with on the Open edX platform can
post a grade back for any LTI XBlock so long as it knows or can guess the
block location for that XBlock.
In LTI 1.3, LTI tools can "pass back" scores that learners earn while using
LTI tools to the edX platform. The edX platform then stores those LTI
scores in a separate table. If the right conditions are met, these scores
are then persisted to the LMS grades tables.
LTI tools can create what are called "line items" on the edX platform. A
line item can be thought of as a column in a grade book; it stores results
for a specific activity (i.e. XBlock) for a specific set of users (i.e.
users in the course using the XBlock). A line item has an optional
resource_link_id field, which is basically the XBlock location. An LTI tool
can supply any value for this field.
An LTI tool submits scores to the edX platform for line items. The code
that uploads that score to the LMS grade tables determines which XBlock to
upload the grades for by reading the resource_link_id field of the
associated line item. Because the LTI tool could have submitted any value
for the resource_link_id field, this introduces the potential for a
nefarious LTI tool to submit scores for any LTI XBlock on the platform.
Impact
Any LTI tool that is integrated with on the Open edX platform can post a
grade back for any LTI XBlock so long as it knows the resource_link_id
(i.e. block location) for that XBlock.
The impact is a loss of integrity for LTI XBlock grades.
Patches
No available patch
Workarounds
No
Permalink: https://github.com/advisories/GHSA-7j9p-67mm-5g87JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS03ajlwLTY3bW0tNWc4N84AA_D0
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Low
Classification: General
Published: 2 months ago
Updated: 2 months ago
CVSS Score: 3.7
CVSS vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Identifiers: GHSA-7j9p-67mm-5g87, CVE-2023-23611
References:
- https://github.com/openedx/xblock-lti-consumer/security/advisories/GHSA-7j9p-67mm-5g87
- https://nvd.nist.gov/vuln/detail/CVE-2023-23611
- https://github.com/openedx/xblock-lti-consumer/commit/252f94bd182cd0962af9251015930cb55ec515d7
- https://github.com/pypa/advisory-database/tree/main/vulns/lti-consumer-xblock/PYSEC-2023-21.yaml
- https://github.com/advisories/GHSA-7j9p-67mm-5g87
Blast Radius: 6.3
Affected Packages
pypi:lti-consumer-xblock
Dependent packages: 0Dependent repositories: 52
Downloads: 60,570 last month
Affected Version Ranges: >= 7.0.0, < 7.2.2
Fixed in: 7.2.2
All affected versions: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.1.0, 7.2.0, 7.2.1
All unaffected versions: 1.4.0, 1.4.2, 2.0.0, 2.0.1, 2.0.2, 2.0.4, 2.1.0, 2.1.1, 2.4.0, 2.5.1, 2.5.2, 2.6.0, 2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.8.0, 2.9.1, 2.10.1, 2.11.0, 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.1.0, 3.1.1, 3.1.2, 3.2.0, 3.3.0, 3.4.0, 3.4.1, 3.4.2, 3.4.3, 3.4.4, 3.4.5, 3.4.6, 3.4.7, 4.0.1, 4.1.0, 4.1.1, 4.2.1, 4.2.2, 4.3.0, 4.3.1, 4.3.2, 4.3.3, 4.4.0, 4.5.0, 4.5.1, 5.0.0, 5.0.1, 6.0.0, 6.1.0, 6.3.0, 6.4.0, 7.2.2, 7.2.3, 7.3.0, 8.0.0, 8.0.1, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.1.0, 9.2.0, 9.2.1, 9.3.0, 9.4.0, 9.5.0, 9.5.1, 9.5.2, 9.5.3, 9.5.4, 9.5.5, 9.5.7, 9.6.0, 9.6.1, 9.6.2, 9.7.0, 9.8.0, 9.8.1, 9.8.2, 9.8.3, 9.10.0, 9.11.0, 9.11.1, 9.11.2, 9.11.3