Package: moodle Severity: grave Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for moodle.
CVE-2008-1502[0]: | The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in | eGroupWare before 1.4.003 allows remote attackers to bypass HTML | filtering and conduct cross-site scripting (XSS) attacks via a string | containing crafted URL protocols. If you fix the vulnerability please also make sure to include the CVE id in your changelog entry. Upstream advisory: http://moodle.org/mod/forum/discuss.php?d=95031 Patches: http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.581.4.10&r2=1.581.4.11&view=patch http://cvs.moodle.org/moodle/lib/kses.php?r1=1.3.12.3&r2=1.3.12.4&view=patch For further information see: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502 http://security-tracker.debian.net/tracker/CVE-2008-1502 -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpTESlyC8pSt.pgp
Description: PGP signature