Learn about CVE-2023-23611 affecting xblock-lti-consumer, enabling unauthorized score submissions for LTI XBlocks on Open edX. Mitigation steps included.
This CVE involves the xblock-lti-consumer container and highlights a Missing Authorization vulnerability in the Grade Pass Back Implementation.
Understanding CVE-2023-23611
This vulnerability affects the LTI Consumer XBlock, which is responsible for integrating third-party LTI provider tools on the Open edX platform. Versions 7.0.0 and above, up to 7.2.2, are vulnerable to Missing Authorization, allowing any integrated LTI tool to post grades back for any LTI XBlock if it can determine the block location.
What is CVE-2023-23611?
The CVE-2023-23611 vulnerability in the xblock-lti-consumer container exposes an issue where a malicious LTI tool can submit scores for any LTI XBlock on the platform, leading to a loss of integrity for LTI XBlock grades.
The Impact of CVE-2023-23611
The primary impact of this vulnerability is the compromise of the integrity of LTI XBlock grades, potentially allowing unauthorized score submissions by malicious actors.
Technical Details of CVE-2023-23611
The vulnerability description revolves around the ability of a malicious LTI tool to manipulate the resource_link_id field, enabling the submission of grades for any LTI XBlock on the platform.
Vulnerability Description
The Missing Authorization vulnerability in the Grade Pass Back Implementation of the xblock-lti-consumer container allows unauthorized LTI tools to submit scores for any LTI XBlock on the Open edX platform.
Affected Systems and Versions
The affected system is the xblock-lti-consumer container from openedx, specifically versions greater than or equal to 7.0.0 and less than 7.2.2.
Exploitation Mechanism
Exploiting this vulnerability involves manipulating the resource_link_id field to submit scores for LTI XBlocks, bypassing authorization checks and compromising the integrity of grades.
Mitigation and Prevention
To address CVE-2023-23611, immediate action and long-term security practices are necessary to secure the Grade Pass Back Implementation of the xblock-lti-consumer container.
Immediate Steps to Take
Users should update the xblock-lti-consumer container to version 7.2.2 or newer to patch the Missing Authorization vulnerability and prevent unauthorized grade submissions.
Long-Term Security Practices
Implement strict authorization checks, regularly update system components, and conduct security audits to prevent similar vulnerabilities in the future.
Patching and Updates
The issue is resolved in version 7.2.2 of the xblock-lti-consumer container, and users are advised to apply this patch promptly to mitigate the vulnerability and enhance system security.