A flaw was found in moodle versions 3.6 to 3.6.1, 3.5 to 3.5.3, 3.4 to 3.4.6, 3.1 to 3.1.15 and earlier unsupported versions. The /userpix/ page did not escape users' full names, which are included as text when hovering over profile images. Note this page is not linked to by default and its access is restricted.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3810 | issue tracking third party advisory patch |
https://moodle.org/mod/forum/discuss.php?d=381230#p1536767 | patch vendor advisory |
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-64372 | patch vendor advisory |
http://packetstormsecurity.com/files/162399/Moodle-3.6.1-Cross-Site-Scripting.html | exploit vdb entry third party advisory |