Back to list
Cross site scripting (XSS) in Moodle 1.8.3
Jan 11 2008 11:51PM
Hanno BÃ¶ck (ml hboeck de)
Source URL of this announcement:
Moodle is a course management system for educators.
The installer code is vulnerable to Cross Site Scripting, letting you inject
installed moodle, so this can be considered low impact. Still it's possible
to attack if an attacker knows from another person installing moodle.
Sample XSS code:
<form method="post" action="http://localhost/moodle/install.php">
<input type="hidden" name="stage" value="3">
<input type="text" name="dbname" value='"><script>alert(1)</script>'>
Update to 1.8.4.
2007-01-08 Vendor contacted
2007-01-08 Vendor fixed cvs
2007-01-11 Vendor released 1.8.4
The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2008-0123 to this issue. This is a candidate for inclusion in the CVE
list (http://cve.mitre.org/), which standardizes names for security problems.
Credits and copyright
This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting.
It's licensed under the creative commons attribution license.
Hanno Boeck, 2008-01-12, http://www.hboeck.de
Hanno BÃ¶ck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno (at) hboeck (dot) de [email concealed]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)
-----END PGP SIGNATURE-----
[ reply ]
Copyright 2010, SecurityFocus