CVE-2008-1502

The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.
References
Link Resource
http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
http://secunia.com/advisories/29491 Vendor Advisory
http://secunia.com/advisories/30073 Vendor Advisory
http://secunia.com/advisories/30986 Vendor Advisory
http://secunia.com/advisories/31017 Vendor Advisory
http://secunia.com/advisories/31018 Vendor Advisory
http://secunia.com/advisories/31167
http://secunia.com/advisories/32400 Vendor Advisory
http://secunia.com/advisories/32446 Vendor Advisory
http://www.debian.org/security/2008/dsa-1691 Patch
http://www.debian.org/security/2009/dsa-1871
http://www.egroupware.org/changelog
http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110 Exploit
http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
http://www.openwall.com/lists/oss-security/2008/07/08/14
http://www.securityfocus.com/bid/28424 Patch
http://www.vupen.com/english/advisories/2008/0989/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
https://usn.ubuntu.com/658-1/
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html
http://secunia.com/advisories/29491 Vendor Advisory
http://secunia.com/advisories/30073 Vendor Advisory
http://secunia.com/advisories/30986 Vendor Advisory
http://secunia.com/advisories/31017 Vendor Advisory
http://secunia.com/advisories/31018 Vendor Advisory
http://secunia.com/advisories/31167
http://secunia.com/advisories/32400 Vendor Advisory
http://secunia.com/advisories/32446 Vendor Advisory
http://www.debian.org/security/2008/dsa-1691 Patch
http://www.debian.org/security/2009/dsa-1871
http://www.egroupware.org/changelog
http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110 Exploit
http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml
http://www.openwall.com/lists/oss-security/2008/07/08/14
http://www.securityfocus.com/bid/28424 Patch
http://www.vupen.com/english/advisories/2008/0989/references Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/41435
https://usn.ubuntu.com/658-1/
https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:1.0:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:1.2.106-2:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:1.4.001:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.0:beta:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.0:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.6.7:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:moodle:moodle:1.8.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:44

Type Values Removed Values Added
References () http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 - Patch, Vendor Advisory () http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5 - Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html - () http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html -
References () http://secunia.com/advisories/29491 - Vendor Advisory () http://secunia.com/advisories/29491 - Vendor Advisory
References () http://secunia.com/advisories/30073 - Vendor Advisory () http://secunia.com/advisories/30073 - Vendor Advisory
References () http://secunia.com/advisories/30986 - Vendor Advisory () http://secunia.com/advisories/30986 - Vendor Advisory
References () http://secunia.com/advisories/31017 - Vendor Advisory () http://secunia.com/advisories/31017 - Vendor Advisory
References () http://secunia.com/advisories/31018 - Vendor Advisory () http://secunia.com/advisories/31018 - Vendor Advisory
References () http://secunia.com/advisories/31167 - () http://secunia.com/advisories/31167 -
References () http://secunia.com/advisories/32400 - Vendor Advisory () http://secunia.com/advisories/32400 - Vendor Advisory
References () http://secunia.com/advisories/32446 - Vendor Advisory () http://secunia.com/advisories/32446 - Vendor Advisory
References () http://www.debian.org/security/2008/dsa-1691 - Patch () http://www.debian.org/security/2008/dsa-1691 - Patch
References () http://www.debian.org/security/2009/dsa-1871 - () http://www.debian.org/security/2009/dsa-1871 -
References () http://www.egroupware.org/changelog - () http://www.egroupware.org/changelog -
References () http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110 - Exploit () http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110 - Exploit
References () http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml - () http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml -
References () http://www.openwall.com/lists/oss-security/2008/07/08/14 - () http://www.openwall.com/lists/oss-security/2008/07/08/14 -
References () http://www.securityfocus.com/bid/28424 - Patch () http://www.securityfocus.com/bid/28424 - Patch
References () http://www.vupen.com/english/advisories/2008/0989/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/0989/references - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41435 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41435 -
References () https://usn.ubuntu.com/658-1/ - () https://usn.ubuntu.com/658-1/ -
References () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html - () https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html -

Information

Published : 2008-03-25 19:44

Updated : 2024-11-21 00:44


NVD link : CVE-2008-1502

Mitre link : CVE-2008-1502

CVE.ORG link : CVE-2008-1502


JSON object : View

Products Affected

moodle

  • moodle

egroupware

  • egroupware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')