moodle/moodle is vulnerable to cross-site scripting. The vulnerability exists due to a lack of validation in the user-supplied data policy tool in the validateUrlSyntax
parameter of moodlelib.php
which allows a remote attacker to inject and execute malicious JavaScript into the system.
CPE | Name | Operator | Version |
---|---|---|---|
moodle/moodle | le | v3.11.10 | |
moodle/moodle | le | v4.0.4 | |
moodle/moodle | le | v3.9.17 | |
moodle/moodle | le | v3.11.10 | |
moodle/moodle | le | v4.0.4 | |
moodle/moodle | le | v3.9.17 |
git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76091
bugzilla.redhat.com/show_bug.cgi?id=2142773
github.com/advisories/GHSA-6gx2-g773-hv9h
github.com/moodle/moodle/commit/0cdb9169cbb9647a5ab87449f9423b806eeb67f2
github.com/moodle/moodle/commit/7eadd4979cd1299400177048cc9c3a604d9374e8
github.com/moodle/moodle/commit/ae8c5e16e94ff5c3a3371749f82f4bb04715c870
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/
lists.fedoraproject.org/archives/list/[email protected]/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/
lists.fedoraproject.org/archives/list/[email protected]/message/74SXNGA5RIWM7QNX7H3G7SYIQLP4UUGV/
lists.fedoraproject.org/archives/list/[email protected]/message/NLRJB5JNKK3VVBLV3NH3RI7COEDAXSAB/
moodle.org/mod/forum/discuss.php?d=440770