[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE id request: moodle XSS and CSRF
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2008-07-25 15:39:42
Message-ID: Pine.GSO.4.51.0807251137410.29569 () faron ! mitre ! org
[Download RAW message or body]


Notice thewebroot disclosure in CVE-2008-3327.

- Steve


======================================================
Name: CVE-2008-3325
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3325
Reference: MISC:http://www.procheckup.com/Vulnerability_PR08-16.php
Reference: CONFIRM:http://moodle.org/mod/forum/discuss.php?d=101405

Cross-site request forgery (CSRF) vulnerability in Moodle 1.6.x before
1.6.7 and 1.7.x before 1.7.5 allows remote attackers to modify profile
settings and gain privileges as other users via a link or IMG tag to
the user edit profile page.


======================================================
Name: CVE-2008-3326
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3326
Reference: MISC:http://www.procheckup.com/Vulnerability_PR08-13.php
Reference: CONFIRM:http://moodle.org/mod/forum/discuss.php?d=101401

Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle
1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to
inject arbitrary web script or HTML via the etitle parameter (blog
entry title).


======================================================
Name: CVE-2008-3327
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3327
Reference: MISC:http://www.procheckup.com/Vulnerability_PR08-15.php
Reference: CONFIRM:http://moodle.org/mod/forum/discuss.php?d=101403

Moodle 1.6.5, when display_errors is enabled, allows remote attackers
to obtain the full installation path via a direct request to (1)
blog/blogpage.php and (2) course/report/stats/report.php, which leaks
the path in an error message.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic