First published: Sat Jul 21 2012(Updated: )
Cross-site scripting (XSS) vulnerability in admin/webservice/forms.php in the web services implementation in Moodle 2.0.x before 2.0.9, 2.1.x before 2.1.6, and 2.2.x before 2.2.3 allows remote authenticated users to inject arbitrary web script or HTML via the name field (aka the service name) to admin/webservice/service.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.0.0 | |
Moodle | =2.0.1 | |
Moodle | =2.0.2 | |
Moodle | =2.0.3 | |
Moodle | =2.0.4 | |
Moodle | =2.0.5 | |
Moodle | =2.0.6 | |
Moodle | =2.0.7 | |
Moodle | =2.0.8 | |
Moodle | =2.1.0 | |
Moodle | =2.1.1 | |
Moodle | =2.1.2 | |
Moodle | =2.1.3 | |
Moodle | =2.1.4 | |
Moodle | =2.1.5 | |
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2361 is considered a medium severity vulnerability due to its potential impact on the security of user data.
To fix CVE-2012-2361, upgrade Moodle to version 2.0.9, 2.1.6, or 2.2.3 or later.
Remote authenticated users of Moodle versions 2.0.x before 2.0.9, 2.1.x before 2.1.6, and 2.2.x before 2.2.3 are affected by CVE-2012-2361.
CVE-2012-2361 is a Cross-Site Scripting (XSS) vulnerability.
An attacker could inject arbitrary web script or HTML into the Moodle web services implementation.