Cross site scripting (XSS) in Moodle 1.8.3 Jan 11 2008 11:51PM
Hanno Böck (ml hboeck de)
Source URL of this announcement:


Moodle is a course management system for educators.
The installer code is vulnerable to Cross Site Scripting, letting you inject
JavaScript and steal cookies. The XSS can only be triggered if there's a not
installed moodle, so this can be considered low impact. Still it's possible
to attack if an attacker knows from another person installing moodle.

Sample code
Sample XSS code:
<form method="post" action="http://localhost/moodle/install.php">
<input type="hidden" name="stage" value="3">
<input type="text" name="dbname" value='"><script>alert(1)</script>'>
<input type=submit>

Update to 1.8.4.

Disclosure Timeline
2007-01-08 Vendor contacted
2007-01-08 Vendor fixed cvs
2007-01-11 Vendor released 1.8.4

CVE Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2008-0123 to this issue. This is a candidate for inclusion in the CVE
list (, which standardizes names for security problems.
Credits and copyright

This vulnerability was discovered by Hanno Boeck of webhosting.
It's licensed under the creative commons attribution license.
Hanno Boeck, 2008-01-12,

Hanno Böck Blog:
GPG: 3DBD3B20 Jabber/Mail: hanno (at) hboeck (dot) de [email concealed]
Version: GnuPG v2.0.7 (GNU/Linux)


[ reply ]


Privacy Statement
Copyright 2010, SecurityFocus