Vulnerability Description
Cross-site scripting (XSS) vulnerability in the print_object function in lib/datalib.php in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3, when a developer debugging script is enabled, allows remote attackers to inject arbitrary web script or HTML via vectors involving object states.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moodle | Moodle | 2.0.0 |
Related Weaknesses (CWE)
References
- http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=187672608ec96659e07f2461b3b
- http://moodle.org/mod/forum/discuss.php?d=191760Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=761248
- http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=187672608ec96659e07f2461b3b
- http://moodle.org/mod/forum/discuss.php?d=191760Vendor Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=761248
FAQ
What is CVE-2011-4591?
CVE-2011-4591 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Cross-site scripting (XSS) vulnerability in the print_object function in lib/datalib.php in Moodle 2.0.x before 2.0.6 and 2.1.x before 2.1.3, when a developer debugging script is enabled, allows remot...
How severe is CVE-2011-4591?
CVE-2011-4591 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4591?
Check the references section above for vendor advisories and patch information. Affected products include: Moodle Moodle.