moodle before versions 3.5.2, 3.4.5, 3.3.8 is vulnerable to a boost theme - blog search GET parameter insufficiently filtered. The breadcrumb navigation provided by Boost theme when displaying search results of a blog were insufficiently filtered, which could result in reflected XSS if a user followed a malicious link containing JavaScript in the search parameter.
References
Link | Resource |
---|---|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62857 | Vendor Advisory Patch |
http://www.securityfocus.com/bid/105371 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14631 | Issue Tracking Patch Third Party Advisory |
https://moodle.org/mod/forum/discuss.php?d=376025 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-09-17 20:29
Updated : 2019-10-09 23:35
NVD link : CVE-2018-14631
Mitre link : CVE-2018-14631
CVE.ORG link : CVE-2018-14631
JSON object : View
Products Affected
moodle
- moodle