Vulnerability Description
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website. This flaw allows a remote attacker to perform cross-site scripting (XSS) attacks.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Moodle | Moodle | >= 3.9.0, < 3.9.19 |
Related Weaknesses (CWE)
References
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810Patch
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526Issue TrackingThird Party Advisory
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021PatchVendor Advisory
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-76810Patch
- https://bugzilla.redhat.com/show_bug.cgi?id=2162526Issue TrackingThird Party Advisory
- https://moodle.org/mod/forum/discuss.php?d=443272#p1782021PatchVendor Advisory
FAQ
What is CVE-2023-23921?
CVE-2023-23921 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in some returnurl parameters. A remote attacker can trick the victim to follow a specially crafte...
How severe is CVE-2023-23921?
CVE-2023-23921 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23921?
Check the references section above for vendor advisories and patch information. Affected products include: Moodle Moodle.