First published: Mon Sep 18 2017(Updated: )
Moodle 3.x has XSS in the contact form on the "non-respondents" page in non-anonymous feedback.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/moodle/moodle | <=3.1.7 | 3.1.8 |
composer/moodle/moodle | >=3.2.0<=3.2.4 | 3.2.5 |
composer/moodle/moodle | >=3.3.0<=3.3.1 | 3.3.2 |
Moodle | =3.0.0 | |
Moodle | =3.0.0-beta | |
Moodle | =3.0.0-rc1 | |
Moodle | =3.0.0-rc2 | |
Moodle | =3.0.0-rc3 | |
Moodle | =3.0.0-rc4 | |
Moodle | =3.0.1 | |
Moodle | =3.0.2 | |
Moodle | =3.0.3 | |
Moodle | =3.0.4 | |
Moodle | =3.0.5 | |
Moodle | =3.0.6 | |
Moodle | =3.0.7 | |
Moodle | =3.0.8 | |
Moodle | =3.0.9 | |
Moodle | =3.0.10 | |
Moodle | =3.1.0 | |
Moodle | =3.1.0-beta | |
Moodle | =3.1.0-rc1 | |
Moodle | =3.1.0-rc2 | |
Moodle | =3.1.1 | |
Moodle | =3.1.2 | |
Moodle | =3.1.3 | |
Moodle | =3.1.4 | |
Moodle | =3.1.5 | |
Moodle | =3.1.6 | |
Moodle | =3.1.7 | |
Moodle | =3.1.8 | |
Moodle | =3.2.0 | |
Moodle | =3.2.0-beta | |
Moodle | =3.2.0-rc1 | |
Moodle | =3.2.0-rc2 | |
Moodle | =3.2.0-rc3 | |
Moodle | =3.2.0-rc4 | |
Moodle | =3.2.0-rc5 | |
Moodle | =3.2.1 | |
Moodle | =3.2.2 | |
Moodle | =3.2.3 | |
Moodle | =3.2.4 | |
Moodle | =3.2.5 | |
Moodle | =3.3.0 | |
Moodle | =3.3.1 | |
Moodle | =3.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12156 is classified as a cross-site scripting (XSS) vulnerability which can potentially allow attackers to execute arbitrary scripts in the context of the user's browser.
To fix CVE-2017-12156, upgrade Moodle to version 3.1.8 or 3.2.5 or later, as these versions provide the necessary security patches.
CVE-2017-12156 affects Moodle versions 3.0.0 through 3.3.1.
CVE-2017-12156 can facilitate cross-site scripting (XSS) attacks, allowing malicious users to inject scripts into web pages viewed by other users.
Yes, the vulnerability occurs due to improper handling of user input in the contact form on the 'non-respondents' page.