First published: Tue Jul 12 2022(Updated: )
A stored Cross-site Scripting (XSS) and blind Server-Side Request Forgery (SSRF) vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moodle Moodle | >=3.9.0<3.9.15 | |
Moodle Moodle | >=3.11.0<3.11.8 | |
Moodle Moodle | =4.0.0 | |
Moodle Moodle | =4.0.0-beta | |
Moodle Moodle | =4.0.0-rc1 | |
Moodle Moodle | =4.0.0-rc2 | |
Moodle Moodle | =4.0.0-rc3 | |
Moodle Moodle | =4.0.0-rc4 | |
Moodle Moodle | =4.0.1 | |
Redhat Enterprise Linux | =8.0 | |
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 | |
redhat/moodle | <4.0.2 | 4.0.2 |
redhat/moodle | <3.11.8 | 3.11.8 |
redhat/moodle | <3.9.15 | 3.9.15 |
composer/moodle/moodle | >=4.0<4.0.2 | 4.0.2 |
composer/moodle/moodle | >=3.11<3.11.8 | 3.11.8 |
composer/moodle/moodle | >=3.9<3.9.15 | 3.9.15 |
>=3.9.0<3.9.15 | ||
>=3.11.0<3.11.8 | ||
=4.0.0 | ||
=4.0.0-beta | ||
=4.0.0-rc1 | ||
=4.0.0-rc2 | ||
=4.0.0-rc3 | ||
=4.0.0-rc4 | ||
=4.0.1 | ||
=8.0 | ||
=35 | ||
=36 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-35651 is a stored XSS and blind SSRF vulnerability found in Moodle.
CVE-2022-35651 occurs due to insufficient sanitization of user-supplied data in the SCORM track details in Moodle.
The severity of CVE-2022-35651 is high, with a severity value of 6.1.
Moodle versions 3.9.0 to 3.9.15 and 3.11.0 to 3.11.8 are affected by CVE-2022-35651.
To fix CVE-2022-35651, update Moodle to version 3.9.15 or 3.11.8, or apply the provided patches.