A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.dionach.com/moodle-jmol-plugin-multiple-vulnerabilities/ | exploit technical description third party advisory |
https://www.exploit-db.com/exploits/46881 | exploit third party advisory |
https://vulncheck.com/advisories/moodle-lms-jmol-plugin-xss | third party advisory |