UBUNTU-CVE-2022-35653

Source
https://ubuntu.com/security/CVE-2022-35653
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-35653.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2022-35653
Related
Published
2022-07-25T16:15:00Z
Modified
2024-10-15T14:10:05Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.

References

Affected packages

Ubuntu:Pro:16.04:LTS / moodle

Package

Name
moodle
Purl
pkg:deb/ubuntu/moodle?arch=src?distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.7.9+dfsg-1
2.7.10+dfsg-1
2.7.11+dfsg-1
2.7.11+dfsg-2
2.7.12+dfsg-1

3.*

3.0.3+dfsg-0ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / moodle

Package

Name
moodle
Purl
pkg:deb/ubuntu/moodle?arch=src?distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.0.3+dfsg-0ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}