|
Message-ID: <Pine.GSO.4.51.0807251137410.29569@faron.mitre.org> Date: Fri, 25 Jul 2008 11:39:42 -0400 (EDT) From: "Steven M. Christey" <coley@...us.mitre.org> To: oss-security@...ts.openwall.com cc: cve@...re.org Subject: Re: CVE id request: moodle XSS and CSRF Notice thewebroot disclosure in CVE-2008-3327. - Steve ====================================================== Name: CVE-2008-3325 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3325 Reference: MISC:http://www.procheckup.com/Vulnerability_PR08-16.php Reference: CONFIRM:http://moodle.org/mod/forum/discuss.php?d=101405 Cross-site request forgery (CSRF) vulnerability in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to modify profile settings and gain privileges as other users via a link or IMG tag to the user edit profile page. ====================================================== Name: CVE-2008-3326 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3326 Reference: MISC:http://www.procheckup.com/Vulnerability_PR08-13.php Reference: CONFIRM:http://moodle.org/mod/forum/discuss.php?d=101401 Cross-site scripting (XSS) vulnerability in blog/edit.php in Moodle 1.6.x before 1.6.7 and 1.7.x before 1.7.5 allows remote attackers to inject arbitrary web script or HTML via the etitle parameter (blog entry title). ====================================================== Name: CVE-2008-3327 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3327 Reference: MISC:http://www.procheckup.com/Vulnerability_PR08-15.php Reference: CONFIRM:http://moodle.org/mod/forum/discuss.php?d=101403 Moodle 1.6.5, when display_errors is enabled, allows remote attackers to obtain the full installation path via a direct request to (1) blog/blogpage.php and (2) course/report/stats/report.php, which leaks the path in an error message.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.