[35683] in bugtraq
Moodle XSS Vulnerability
daemon@ATHENA.MIT.EDU (Thomas Waldegger)
Tue Jul 13 12:33:40 2004
Date: 13 Jul 2004 15:54:08 -0000
Message-ID: <20040713155408.18582.qmail@www.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Thomas Waldegger <morpheus@buha.info>
To: bugtraq@securityfocus.com
Moodle XSS Vulnerability (13.07.04)
Vendor: Moodle
URL: http://moodle.org/
Version: Moodle 1.3.2+, Moodle 1.4 dev
Risk: XSS
Description:
"Moodle is a course management system (CMS) - a software package designed to help educators create quality online courses."
See http://moodle.org/ for a detailed description.
Cross Site Scripting:
It's possible to inject HTML or JavaScript code into the variable "file" of help.php. The bug is similar to the vuln discovered by Bartek Nowotarski [1].
http://www.example.com/help.php?file={XSS}
Solution:
Martin Dougiamas the lead developer of Moodle fixed the bug in CVS Stable and Development but there is not any new release yet.
Here [2] you can find the patched version of help.php.
> $file = clean_text($file);
> notify("Help file '$file' could not be found!");
Credits:
Thomas Waldegger (morpheus)
BuHa-Security Board
http://www.buha.info/board/
[1] http://www.securityfocus.com/archive/1/361841
[2] http://cvs.sourceforge.net/viewcvs.py/moodle/moodle/help.php