mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
193 lines
6.5 KiB
JSON
193 lines
6.5 KiB
JSON
{
|
|
"id": "CVE-2022-35651",
|
|
"sourceIdentifier": "patrick@puiterwijk.org",
|
|
"published": "2022-07-25T16:15:08.407",
|
|
"lastModified": "2023-11-07T03:49:20.020",
|
|
"vulnStatus": "Modified",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se encontr\u00f3 una vulnerabilidad de tipo XSS almacenado y SSRF ciego en Moodle, es producido debido a un saneamiento insuficiente de los datos suministrados por el usuario en los detalles de la pista SCORM. Un atacante remoto puede enga\u00f1ar a la v\u00edctima para que siga un enlace especialmente dise\u00f1ado y ejecutar c\u00f3digo HTML y script arbitrario en el navegador del usuario en el contexto del sitio web vulnerable para robar informaci\u00f3n potencialmente confidencial, cambiar la apariencia de la p\u00e1gina web, puede llevar a cabo ataques de phishing y drive-by-download"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "NONE",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 6.1,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 2.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "patrick@puiterwijk.org",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "3.9.0",
|
|
"versionEndExcluding": "3.9.15",
|
|
"matchCriteriaId": "6B77A5BD-2E62-402E-91AE-123454C5C5C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
|
|
"versionStartIncluding": "3.11.0",
|
|
"versionEndExcluding": "3.11.8",
|
|
"matchCriteriaId": "EED9C096-FAE5-4206-B901-1D2EDD67AE7B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:-:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6C077F6B-BA29-4B33-BD6B-AB4BEC630C47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:beta:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E3788731-D2EA-47BA-82C0-67E046AC6EF7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D46F561A-115D-4778-9565-FDAE3E36E5D1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E1E3A617-1A85-4CD9-AABD-0705B8CEBBDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc3:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E81FE226-7833-4D1B-BB67-A3D2D09E9BE5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.0:rc4:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DC631535-FA72-4293-AC5C-56B3D1AFB1A0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:moodle:moodle:4.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "63597916-DD15-4E78-8C27-2CE6F1A5A76C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
|
|
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921",
|
|
"source": "patrick@puiterwijk.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2106275",
|
|
"source": "patrick@puiterwijk.org",
|
|
"tags": [
|
|
"Issue Tracking",
|
|
"Third Party Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6MOKYVRNFNAODP2XSMGJ5CRDUZCZKAR3/",
|
|
"source": "patrick@puiterwijk.org"
|
|
},
|
|
{
|
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTKUSFPSYFINSQFSOHDQIDVE6FWBEU6V/",
|
|
"source": "patrick@puiterwijk.org"
|
|
},
|
|
{
|
|
"url": "https://moodle.org/mod/forum/discuss.php?d=436458",
|
|
"source": "patrick@puiterwijk.org",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |