moodle before versions 3.5.2, 3.4.5, 3.3.8 is vulnerable to a boost theme - blog search GET parameter insufficiently filtered. The breadcrumb navigation provided by Boost theme when displaying search results of a blog were insufficiently filtered, which could result in reflected XSS if a user followed a malicious link containing JavaScript in the search parameter.
References
Link | Resource |
---|---|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62857 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/105371 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14631 | Issue Tracking Patch Third Party Advisory |
https://moodle.org/mod/forum/discuss.php?d=376025 | Patch Vendor Advisory |
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62857 | Patch Vendor Advisory |
http://www.securityfocus.com/bid/105371 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14631 | Issue Tracking Patch Third Party Advisory |
https://moodle.org/mod/forum/discuss.php?d=376025 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62857 - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/105371 - Third Party Advisory, VDB Entry | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14631 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://moodle.org/mod/forum/discuss.php?d=376025 - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 8.8 |
Information
Published : 2018-09-17 20:29
Updated : 2024-11-21 03:49
NVD link : CVE-2018-14631
Mitre link : CVE-2018-14631
CVE.ORG link : CVE-2018-14631
JSON object : View
Products Affected
moodle
- moodle