GSD-2019-3810
Vulnerability from gsd - Updated: 2023-12-13 01:24Details
A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2019-3810",
"description": "A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users\u0027 full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted.",
"id": "GSD-2019-3810",
"references": [
"https://packetstormsecurity.com/files/cve/CVE-2019-3810"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-3810"
],
"details": "A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users\u0027 full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted.",
"id": "GSD-2019-3810",
"modified": "2023-12-13T01:24:04.309472Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3810",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "moodle",
"version": {
"version_data": [
{
"version_value": "3.6.2"
},
{
"version_value": "3.5.4"
},
{
"version_value": "3.4.7"
},
{
"version_value": "3.1.16"
}
]
}
}
]
},
"vendor_name": "[UNKNOWN]"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users\u0027 full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.3/CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810"
},
{
"name": "https://moodle.org/mod/forum/discuss.php?d=381230#p1536767",
"refsource": "CONFIRM",
"url": "https://moodle.org/mod/forum/discuss.php?d=381230#p1536767"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-64372",
"refsource": "CONFIRM",
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-64372"
},
{
"name": "http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c=3.0.10||\u003e=3.1.0,\u003c=3.1.15||\u003e=3.4.0,\u003c=3.4.6||\u003e=3.5.0,\u003c=3.5.3||\u003e=3.6.0,\u003c=3.6.1",
"affected_versions": "All versions up to 3.0.10, all versions starting from 3.1.0 up to 3.1.15, all versions starting from 3.4.0 up to 3.4.6, all versions starting from 3.5.0 up to 3.5.3, all versions starting from 3.6.0 up to 3.6.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"cwe_ids": [
"CWE-1035",
"CWE-20",
"CWE-937"
],
"date": "2019-10-09",
"description": "The `/userpix/` page did not escape users\u0027 full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted.",
"fixed_versions": [
"3.1.16",
"3.4.7",
"3.5.4",
"3.6.2"
],
"identifier": "CVE-2019-3810",
"identifiers": [
"CVE-2019-3810"
],
"not_impacted": "All versions after 3.0.10 before 3.1.0, all versions after 3.1.15 before 3.4.0, all versions after 3.4.6 before 3.5.0, all versions after 3.5.3 before 3.6.0, all versions after 3.6.1",
"package_slug": "packagist/moodle/moodle",
"pubdate": "2019-03-25",
"solution": "Upgrade to versions 3.1.16, 3.4.7, 3.5.4, 3.6.2 or above.",
"title": "Information Exposure",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2019-3810",
"http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-64372",
"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810",
"https://moodle.org/mod/forum/discuss.php?d=381230#p1536767"
],
"uuid": "4c8c44e5-4453-447c-a3ee-b40c754eeff5"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.1.15",
"versionStartIncluding": "3.1.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.4.6",
"versionStartIncluding": "3.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.5.3",
"versionStartIncluding": "3.5.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.6.1",
"versionStartIncluding": "3.6.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3810"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users\u0027 full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://moodle.org/mod/forum/discuss.php?d=381230#p1536767",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://moodle.org/mod/forum/discuss.php?d=381230#p1536767"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810"
},
{
"name": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-64372",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://git.moodle.org/gw?p=moodle.git\u0026a=search\u0026h=HEAD\u0026st=commit\u0026s=MDL-64372"
},
{
"name": "http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2022-11-07T19:02Z",
"publishedDate": "2019-03-25T18:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…