First published: Tue Mar 25 2008(Updated: )
The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | <1.8.5 | 1.8.5 |
Allegro | <=1.4.002 | |
Allegro | =1.0 | |
Allegro | =1.0.1 | |
Allegro | =1.0.3 | |
Allegro | =1.0.6 | |
Allegro | =1.2.106-2 | |
Allegro | =1.4.001 | |
Moodle | <=1.8.4 | |
Moodle | =1.1.1 | |
Moodle | =1.2.0 | |
Moodle | =1.2.1 | |
Moodle | =1.3.0 | |
Moodle | =1.3.1 | |
Moodle | =1.3.2 | |
Moodle | =1.3.3 | |
Moodle | =1.3.4 | |
Moodle | =1.4.1 | |
Moodle | =1.4.2 | |
Moodle | =1.4.3 | |
Moodle | =1.4.4 | |
Moodle | =1.4.5 | |
Moodle | =1.5 | |
Moodle | =1.5.0-beta | |
Moodle | =1.5.1 | |
Moodle | =1.5.2 | |
Moodle | =1.5.3 | |
Moodle | =1.6.0 | |
Moodle | =1.6.1 | |
Moodle | =1.6.2 | |
Moodle | =1.6.3 | |
Moodle | =1.6.4 | |
Moodle | =1.6.5 | |
Moodle | =1.6.6 | |
Moodle | =1.6.7 | |
Moodle | =1.7.1 | |
Moodle | =1.7.2 | |
Moodle | =1.7.3 | |
Moodle | =1.7.4 | |
Moodle | =1.7.5 | |
Moodle | =1.7.6 | |
Moodle | =1.8.1 | |
Moodle | =1.8.2 | |
Moodle | =1.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1502 has been classified with a severity that allows potential remote code execution through cross-site scripting (XSS) attacks.
To mitigate the risks of CVE-2008-1502, update to Moodle version 1.8.5 or later and ensure you are using the latest version of eGroupWare.
CVE-2008-1502 affects eGroupWare versions before 1.4.003 and Moodle versions before 1.8.5, along with various older versions of both software.
CVE-2008-1502 allows attackers to bypass HTML filtering, enabling them to conduct cross-site scripting (XSS) attacks.
There is no specific patch for CVE-2008-1502, but upgrading to the fixed versions is recommended to ensure security.