cve-2022-35651
Vulnerability from cvelistv5
Published
2022-07-25 15:30
Modified
2024-08-03 09:36
Severity ?
EPSS score ?
Summary
A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks.
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:36:44.408Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106275" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://moodle.org/mod/forum/discuss.php?d=436458" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-71921" }, { "name": "FEDORA-2022-81ce74b2dd", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/" }, { "name": "FEDORA-2022-7e7ce7df2e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Moodle", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Fixed in moodle 4.0.2, moodle 3.11.8, moodle 3.9.15" } ] } ], "descriptions": [ { "lang": "en", "value": "A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user\u0027s browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 - Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-07-27T04:06:37", "orgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "shortName": "fedora" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106275" }, { "tags": [ "x_refsource_MISC" ], "url": "https://moodle.org/mod/forum/discuss.php?d=436458" }, { "tags": [ "x_refsource_MISC" ], "url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-71921" }, { "name": "FEDORA-2022-81ce74b2dd", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/" }, { "name": "FEDORA-2022-7e7ce7df2e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "patrick@puiterwijk.org", "ID": "CVE-2022-35651", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Moodle", "version": { "version_data": [ { "version_value": "Fixed in moodle 4.0.2, moodle 3.11.8, moodle 3.9.15" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user\u0027s browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 - Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2106275", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106275" }, { "name": "https://moodle.org/mod/forum/discuss.php?d=436458", "refsource": "MISC", "url": "https://moodle.org/mod/forum/discuss.php?d=436458" }, { "name": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-71921", "refsource": "MISC", "url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-71921" }, { "name": "FEDORA-2022-81ce74b2dd", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/" }, { "name": "FEDORA-2022-7e7ce7df2e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/" } ] } } } }, "cveMetadata": { "assignerOrgId": "92fb86c3-55a5-4fb5-9c3f-4757b9e96dc5", "assignerShortName": "fedora", "cveId": "CVE-2022-35651", "datePublished": "2022-07-25T15:30:22", "dateReserved": "2022-07-12T00:00:00", "dateUpdated": "2024-08-03T09:36:44.408Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-35651\",\"sourceIdentifier\":\"patrick@puiterwijk.org\",\"published\":\"2022-07-25T16:15:08.407\",\"lastModified\":\"2023-11-07T03:49:20.020\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user\u0027s browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad de tipo XSS almacenado y SSRF ciego en Moodle, es producido debido a un saneamiento insuficiente de los datos suministrados por el usuario en los detalles de la pista SCORM. Un atacante remoto puede enga\u00f1ar a la v\u00edctima para que siga un enlace especialmente dise\u00f1ado y ejecutar c\u00f3digo HTML y script arbitrario en el navegador del usuario en el contexto del sitio web vulnerable para robar informaci\u00f3n potencialmente confidencial, cambiar la apariencia de la p\u00e1gina web, puede llevar a cabo ataques de phishing y drive-by-download\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"patrick@puiterwijk.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.0\",\"versionEndExcluding\":\"3.9.15\",\"matchCriteriaId\":\"6B77A5BD-2E62-402E-91AE-123454C5C5C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.11.0\",\"versionEndExcluding\":\"3.11.8\",\"matchCriteriaId\":\"EED9C096-FAE5-4206-B901-1D2EDD67AE7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C077F6B-BA29-4B33-BD6B-AB4BEC630C47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3788731-D2EA-47BA-82C0-67E046AC6EF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D46F561A-115D-4778-9565-FDAE3E36E5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1E3A617-1A85-4CD9-AABD-0705B8CEBBDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E81FE226-7833-4D1B-BB67-A3D2D09E9BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC631535-FA72-4293-AC5C-56B3D1AFB1A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:moodle:moodle:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63597916-DD15-4E78-8C27-2CE6F1A5A76C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"053C1B35-3869-41C2-9551-044182DE0A64\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD\"}]}]}],\"references\":[{\"url\":\"http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-71921\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2106275\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/\",\"source\":\"patrick@puiterwijk.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/\",\"source\":\"patrick@puiterwijk.org\"},{\"url\":\"https://moodle.org/mod/forum/discuss.php?d=436458\",\"source\":\"patrick@puiterwijk.org\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.