Chamilo Chamilo-lms version 1.11.8 and earlier contains a Cross Site Scripting (XSS) vulnerability in main/messages/new_message.php, main/social/personal_data.php, main/inc/lib/TicketManager.php, main/ticket/ticket_details.php that can result in a message being sent to the Administrator with the XSS to steal cookies. A ticket can be created with a XSS payload in the subject field. This attack appears to be exploitable via <svg/onload=alert(1)> as the payload user on the Subject field. This makes it possible to obtain the cookies of all users that have permission to view the tickets. This vulnerability appears to have been fixed in 1.11.x after commit 33e2692a37b5b6340cf5bec1a84e541460983c03.
References
Link | Resource |
---|---|
https://github.com/chamilo/chamilo-lms/commit/33e2692a37b5b6340cf5bec1a84e541460983c03 | Patch Third Party Advisory |
https://github.com/chamilo/chamilo-lms/commit/33e2692a37b5b6340cf5bec1a84e541460983c03 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/chamilo/chamilo-lms/commit/33e2692a37b5b6340cf5bec1a84e541460983c03 - Patch, Third Party Advisory |
Information
Published : 2019-02-04 21:29
Updated : 2024-11-21 04:17
NVD link : CVE-2019-1000015
Mitre link : CVE-2019-1000015
CVE.ORG link : CVE-2019-1000015
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')