FKIE_CVE-2022-35653
Vulnerability from fkie_nvd - Published: 2022-07-25 16:15 - Updated: 2024-11-21 07:11
Severity ?
Summary
A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.
References
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6B77A5BD-2E62-402E-91AE-123454C5C5C6",
"versionEndExcluding": "3.9.15",
"versionStartIncluding": "3.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EED9C096-FAE5-4206-B901-1D2EDD67AE7B",
"versionEndExcluding": "3.11.8",
"versionStartIncluding": "3.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "6C077F6B-BA29-4B33-BD6B-AB4BEC630C47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "E3788731-D2EA-47BA-82C0-67E046AC6EF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D46F561A-115D-4778-9565-FDAE3E36E5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E1E3A617-1A85-4CD9-AABD-0705B8CEBBDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E81FE226-7833-4D1B-BB67-A3D2D09E9BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DC631535-FA72-4293-AC5C-56B3D1AFB1A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:moodle:moodle:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "63597916-DD15-4E78-8C27-2CE6F1A5A76C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user\u0027s browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users."
},
{
"lang": "es",
"value": "Se ha identificado un problema de tipo XSS reflejado en el m\u00f3dulo LTI de Moodle. La vulnerabilidad es debido a un saneamiento insuficiente de los datos suministrados por el usuario en el m\u00f3dulo LTI. Un atacante remoto puede enga\u00f1ar a la v\u00edctima para que siga un enlace especialmente dise\u00f1ado y ejecutar c\u00f3digo HTML y script arbitrario en el navegador del usuario en el contexto del sitio web vulnerable para robar informaci\u00f3n potencialmente confidencial, cambiar la apariencia de la p\u00e1gina web, puede llevar a cabo ataques de phishing y drive-by-download. Esta vulnerabilidad no afecta a usuarios autenticados"
}
],
"id": "CVE-2022-35653",
"lastModified": "2024-11-21T07:11:26.603",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-07-25T16:15:08.520",
"references": [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-72299"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106277"
},
{
"source": "patrick@puiterwijk.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/"
},
{
"source": "patrick@puiterwijk.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=436460"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-72299"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106277"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=436460"
}
],
"sourceIdentifier": "patrick@puiterwijk.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "patrick@puiterwijk.org",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…