First published: Tue Oct 31 2017(Updated: )
Mahara 15.04 before 15.04.15, 16.04 before 16.04.9, 16.10 before 16.10.6, and 17.04 before 17.04.4 are vulnerable to a user submitting a potential dangerous payload, e.g., XSS code, to be saved as titles in internal artefacts.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mahara | =15.04-rc1 | |
Mahara | =15.04-rc2 | |
Mahara | =15.04.0 | |
Mahara | =15.04.1 | |
Mahara | =15.04.2 | |
Mahara | =15.04.3 | |
Mahara | =15.04.4 | |
Mahara | =15.04.5 | |
Mahara | =15.04.6 | |
Mahara | =15.04.7 | |
Mahara | =15.04.8 | |
Mahara | =15.04.9 | |
Mahara | =15.04.10 | |
Mahara | =15.04.11 | |
Mahara | =15.04.12 | |
Mahara | =15.04.13 | |
Mahara | =15.04.15 | |
Mahara | =16.04-rc1 | |
Mahara | =16.04-rc2 | |
Mahara | =16.04.0 | |
Mahara | =16.04.1 | |
Mahara | =16.04.2 | |
Mahara | =16.04.3 | |
Mahara | =16.04.4 | |
Mahara | =16.04.5 | |
Mahara | =16.04.6 | |
Mahara | =16.04.7 | |
Mahara | =16.04.8 | |
Mahara | =16.10-rc1 | |
Mahara | =16.10-rc2 | |
Mahara | =16.10.0 | |
Mahara | =16.10.1 | |
Mahara | =16.10.2 | |
Mahara | =16.10.3 | |
Mahara | =16.10.4 | |
Mahara | =16.10.5 | |
Mahara | =17.04-rc1 | |
Mahara | =17.04-rc2 | |
Mahara | =17.04.0 | |
Mahara | =17.04.1 | |
Mahara | =17.04.2 | |
Mahara | =17.04.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15273 is considered a moderate severity security vulnerability due to its potential for cross-site scripting (XSS) attacks.
To fix CVE-2017-15273, upgrade Mahara to version 15.04.15, 16.04.9, 16.10.6, or 17.04.4 or later.
Affected software includes Mahara versions 15.04 before 15.04.15, 16.04 before 16.04.9, 16.10 before 16.10.6, and 17.04 before 17.04.4.
CVE-2017-15273 involves a potential vulnerability where users can submit malicious payloads, such as XSS code, when saving titles in internal artifacts.
There is no effective workaround for CVE-2017-15273; the recommended action is to apply the necessary software update.