Spike PHPCoverage 跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1120274 漏洞类型 跨站脚本
发布时间 2011-02-01 更新时间 2012-07-16
CVE编号 CVE-2011-4280 CNNVD-ID CNNVD-201207-202
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/35297
https://www.securityfocus.com/bid/73649
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201207-202
|漏洞详情
Moodle是澳大利亚马丁-多基马(MartinDougiamas)博士开发的一套免费、开源的电子学习软件平台,也称课程管理系统、学习管理系统或虚拟学习环境。使用在Moodle2.0.2之前2.0.x版本和其他产品中的SpikePHPCoverage(又名spikephpcoverage)库中存在跨站脚本(XSS)漏洞。远程攻击者可利用该漏洞通过未明向量注入任意web脚本或HTML。
|漏洞EXP
source: http://www.securityfocus.com/bid/46085/info

Moodle is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.

Exploiting this vulnerability may allow an attacker to perform cross-site scripting attacks on unsuspecting users in the context of the affected website. As a result, the attacker may be able to steal cookie-based authentication credentials and to launch other attacks.

Versions prior to Moodle 2.0.1 are vulnerable. 

http://www.example.com/moodle/lib/spikephpcoverage/src/phpcoverage.remote.top.inc.php?PHPCOVERAGE_HOME=[xss]
|受影响的产品
Nimish Pachapurkar Spike Phpcoverage 0 Moodle Moodle 2.0.1 Moodle Moodle 2.0
|参考资料

来源:MLIST
名称:[oss-security]20111113Re:Fwd:DSA2338-1moodlesecurityupdate
链接:http://openwall.com/lists/oss-security/2011/11/14/1
来源:moodle.org
链接:http://moodle.org/mod/forum/discuss.php?d=170005
来源:git.moodle.org
链接:http://git.moodle.org/gw?p=moodle.git;a=commit;h=bd654f0ced8af925c27b7c94321f0c299b50b38e