Moodle Multiple Input Validation Vulnerabilities
BID:21596
Info
Moodle Multiple Input Validation Vulnerabilities
| Bugtraq ID: | 21596 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Dec 14 2006 12:00AM |
| Updated: | Dec 15 2006 07:48PM |
| Credit: | These vulnerabilities were discovered by Jose Miguel Yanez Venegas. |
| Vulnerable: |
Moodle moodle 1.6.1 Moodle moodle 1.5.2 Moodle moodle 1.5.1 Moodle moodle 1.5 BEA Systems Weblogic Proxy Plugin 1.5.3 + BEA Systems Weblogic Proxy Plugin 1.5.3 |
| Not Vulnerable: | |
Discussion
Moodle Multiple Input Validation Vulnerabilities
Moodle is reported prone to multiple input-validation vulnerabilities, including a cross-site scripting issue and an HTML injection issue, because the application fails to properly sanitize user-supplied input data.
The cross-site scripting vulnerability is reported to affect version 1.6.1; the HTML-injection vulnerability affects version 1.5.
Moodle is reported prone to multiple input-validation vulnerabilities, including a cross-site scripting issue and an HTML injection issue, because the application fails to properly sanitize user-supplied input data.
The cross-site scripting vulnerability is reported to affect version 1.6.1; the HTML-injection vulnerability affects version 1.5.
Exploit / POC
Moodle Multiple Input Validation Vulnerabilities
Attackers can exploit the HTML-injection issue through a web-client. Attackers can exploit the cross-site scripting issue by enticing an unsuspecting victim to follow a malicious URI.
Sample exploit code has been provided:
Attackers can exploit the HTML-injection issue through a web-client. Attackers can exploit the cross-site scripting issue by enticing an unsuspecting victim to follow a malicious URI.
Sample exploit code has been provided:
Solution / Fix
Moodle Multiple Input Validation Vulnerabilities
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Solution:
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].