moodle before versions 3.5.2, 3.4.5, 3.3.8 is vulnerable to a boost theme - blog search GET parameter insufficiently filtered. The breadcrumb navigation provided by Boost theme when displaying search results of a blog were insufficiently filtered, which could result in reflected XSS if a user followed a malicious link containing JavaScript in the search parameter.
References
Link | Resource |
---|---|
https://moodle.org/mod/forum/discuss.php?d=376025 | Patch Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14631 | Issue Tracking Patch Third Party Advisory |
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62857 | Vendor Advisory Patch |
http://www.securityfocus.com/bid/105371 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-09-17 13:29
Updated : 2019-10-09 16:35
NVD link : CVE-2018-14631
Mitre link : CVE-2018-14631
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
moodle
- moodle