First published: Sat Jul 21 2012(Updated: )
Cross-site scripting (XSS) vulnerability in Moodle 2.0.x before 2.0.9, 2.1.x before 2.1.6, and 2.2.x before 2.2.3 allows remote authenticated users to inject arbitrary web script or HTML via the idnumber field to cohort/edit.php.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle | =2.0.0 | |
Moodle | =2.0.1 | |
Moodle | =2.0.2 | |
Moodle | =2.0.3 | |
Moodle | =2.0.4 | |
Moodle | =2.0.5 | |
Moodle | =2.0.6 | |
Moodle | =2.0.7 | |
Moodle | =2.0.8 | |
Moodle | =2.1.0 | |
Moodle | =2.1.1 | |
Moodle | =2.1.2 | |
Moodle | =2.1.3 | |
Moodle | =2.1.4 | |
Moodle | =2.1.5 | |
Moodle | =2.2.0 | |
Moodle | =2.2.1 | |
Moodle | =2.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2365 has a medium severity rating due to potential exploitation through cross-site scripting.
To resolve CVE-2012-2365, upgrade Moodle to version 2.0.9 or later, 2.1.6 or later, or 2.2.3 or later.
CVE-2012-2365 affects Moodle versions 2.0.x prior to 2.0.9, 2.1.x prior to 2.1.6, and 2.2.x prior to 2.2.3.
CVE-2012-2365 is classified as a cross-site scripting (XSS) vulnerability.
CVE-2012-2365 can be exploited by remote authenticated users who access the cohort/edit.php page.