Bug 2277802 (CVE-2024-33998, MSA-24-0009)

Summary: CVE-2024-33998 moodle: stored XSS via user's name on participants page when opening some options
Product: [Other] Security Response Reporter: Robb Gatica <rgatica>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: moodle 4.3.4, moodle 4.2.7, moodle 4.1.10 Doc Type: If docs needed, set a value
Doc Text:
Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2282045, 2282046    
Bug Blocks: 2277786    

Description Robb Gatica 2024-04-29 15:53:05 UTC
Description: Insufficient escaping of participants' names in the participants page table resulted in a stored XSS risk when interacting with some features.

Issue summary: 
Stored XSS via user's name on participants page when opening some options

Severity/Risk: 
Minor

Versions affected: 
4.0 to 4.3.3, 4.2 to 4.2.6, 4.1 to 4.1.9 and earlier unsupported versions

Versions fixed: 
4.3.4, 4.2.7 and 4.1.10

Reported by: Aleksey Solovev (Positive Technologies)
Issue no.: MDL-81354

Changes (master):
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-81354

Comment 1 Robb Gatica 2024-05-21 01:49:12 UTC
Created moodle tracking bugs for this issue:

Affects: epel-all [bug 2282045]
Affects: fedora-all [bug 2282046]