First published: Mon Feb 04 2019(Updated: )
Chamilo Chamilo-lms version 1.11.8 and earlier contains a Cross Site Scripting (XSS) vulnerability in main/messages/new_message.php, main/social/personal_data.php, main/inc/lib/TicketManager.php, main/ticket/ticket_details.php that can result in a message being sent to the Administrator with the XSS to steal cookies. A ticket can be created with a XSS payload in the subject field. This attack appears to be exploitable via <svg/onload=alert(1)> as the payload user on the Subject field. This makes it possible to obtain the cookies of all users that have permission to view the tickets. This vulnerability appears to have been fixed in 1.11.x after commit 33e2692a37b5b6340cf5bec1a84e541460983c03.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chamilo Chamilo Lms | <=1.11.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1000015.
The severity of CVE-2019-1000015 is medium with a CVSS score of 6.1.
The affected software for CVE-2019-1000015 is Chamilo-lms version 1.11.8 and earlier.
The CWE ID for this vulnerability is CWE-79.
To fix the XSS vulnerability in Chamilo Chamilo-lms version 1.11.8, apply the patch provided by Chamilo or upgrade to a version that has the vulnerability patched.