Package: moodle
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for moodle.

CVE-2008-1502[0]:
| The _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in
| eGroupWare before 1.4.003 allows remote attackers to bypass HTML
| filtering and conduct cross-site scripting (XSS) attacks via a string
| containing crafted URL protocols.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

Upstream advisory:
http://moodle.org/mod/forum/discuss.php?d=95031

Patches:
http://cvs.moodle.org/moodle/lib/weblib.php?r1=1.581.4.10&r2=1.581.4.11&view=patch
http://cvs.moodle.org/moodle/lib/kses.php?r1=1.3.12.3&r2=1.3.12.4&view=patch

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502
    http://security-tracker.debian.net/tracker/CVE-2008-1502

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpTESlyC8pSt.pgp
Description: PGP signature

Reply via email to