Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to drag items to zones on a target image. Versions prior to 3.0.0 are vulnerable to cross-site scripting in multiple XBlock Fields. Any platform that has deployed the XBlock may be impacted. Version 3.0.0 contains a patch for this issue. There are no known workarounds.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/openedx/xblock-drag-and-drop-v2/security/advisories/GHSA-qv6c-367r-3w6q | third party advisory patch |
https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864 | exploit third party advisory patch |
https://github.com/openedx/xblock-drag-and-drop-v2/commit/68887d1b4a44325d2de7573d450e41129ba98b1a | release notes third party advisory patch |
https://github.com/openedx/xblock-drag-and-drop-v2/releases/tag/v3.0.0 | release notes third party advisory patch |