Summary
This host is running Moodle and is prone to Cross-Site Scripting and Cross Site Request Forgery Vulnerabilities.
Impact
Successful exploitation will allow attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and to gain knowledge of sensitive information or to conduct cross-site request forgery attacks.
Impact Level: Application.
Solution
Upgrade to Moodle version 1.8.13 or 1.9.9 or later For updates refer to http://moodle.org/downloads/
Insight
The flaws are due to,
- Certain input passed to the 'MNET' access control interface is not properly sanitised before being used.
- Improper validation of user supplied data to the 'blog/index.php' page, which allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
- Error in 'KSES text cleaning filter' in 'lib/weblib.php' which fails to properly handle 'vbscript URIs', which allows remote authenticated users to conduct cross-site scripting (XSS) attacks via HTML input.
- Allowing users to perform certain actions via 'HTTP requests' without performing any validity checks to verify the requests. This can be exploited to delete certain quiz reports by tricking a user into visiting a specially crafted site.
Affected
Moodle version 1.8.x prior to 1.8.13
Moodle version 1.9.x prior to 1.9.9
References
Severity
Classification
-
CVE CVE-2010-2228, CVE-2010-2229, CVE-2010-2230, CVE-2010-2231 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- appRain CMF 'uploadify.php' Remote Arbitrary File Upload Vulnerability
- APC PowerChute Network Shutdown HTTP Response Splitting Vulnerability
- Apache Subversion Module Metadata Accessible
- AMSI 'file' Parameter Directory Traversal Vulnerability