Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to drag items to zones on a target image. Versions prior to 3.0.0 are vulnerable to cross-site scripting in multiple XBlock Fields. Any platform that has deployed the XBlock may be impacted. Version 3.0.0 contains a patch for this issue. There are no known workarounds.
References
Link | Resource |
---|---|
https://github.com/openedx/xblock-drag-and-drop-v2/security/advisories/GHSA-qv6c-367r-3w6q | Patch Third Party Advisory |
https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864 | Exploit Patch Third Party Advisory |
https://github.com/openedx/xblock-drag-and-drop-v2/releases/tag/v3.0.0 | Patch Release Notes Third Party Advisory |
https://github.com/openedx/xblock-drag-and-drop-v2/commit/68887d1b4a44325d2de7573d450e41129ba98b1a | Patch Release Notes Third Party Advisory |
Configurations
Information
Published : 2022-11-28 13:15
Updated : 2022-12-01 15:07
NVD link : CVE-2022-46147
Mitre link : CVE-2022-46147
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
openedx
- xblock-drag-and-drop-v2