GHSA-v759-3wr5-p294

Suggest an improvement
Source
https://github.com/advisories/GHSA-v759-3wr5-p294
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-v759-3wr5-p294/GHSA-v759-3wr5-p294.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-v759-3wr5-p294
Aliases
Published
2022-05-01T23:40:50Z
Modified
2024-02-09T16:26:39.410573Z
Summary
Moodle vulnerable to Cross-site scripting
Details

The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.

Database specific
{
    "nvd_published_at": "2008-03-25T19:44:00Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2024-02-09T15:44:56Z"
}
References

Affected packages

Packagist / moodle/moodle

Package

Name
moodle/moodle
Purl
pkg:composer/moodle/moodle

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.5