Miggo Logo

CVE-2024-34006:
Moodle Unsanitized HTML in site log for config_log_created

4.3

CVSS Score
3.1

Basic Information

EPSS Score
0.6938%
Published
5/31/2024
Updated
7/5/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
moodle/moodlecomposer>= 4.3.0, < 4.3.44.3.4
moodle/moodlecomposer>= 4.2.0, < 4.2.74.2.7
moodle/moodlecomposer< 4.1.104.1.10

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unescaped HTML in site log event descriptions. Moodle's log table rendering uses column-specific methods like col_{columnname} to display data. The col_description method in the log table class (admin/tool/log/classes/table/log.php) is responsible for outputting event descriptions. Prior to patching, this method likely returned raw data without applying Moodle's output escaping (e.g., s() function or format_text with appropriate options), making it vulnerable to XSS via log entries. The CWE-838 classification confirms this is an output encoding issue, and the patch would have added escaping in this display layer function.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** sit* lo* r*port r*quir** ***ition*l *n*o*in* o* *v*nt **s*riptions to *nsur* *ny *TML in t** *ont*nt is *ispl*y** in pl*int*xt inst*** o* **in* r*n**r**.

Reasoning

T** vuln*r**ility st*ms *rom un*s**p** *TML in sit* lo* *v*nt **s*riptions. Moo*l*'s lo* t**l* r*n**rin* us*s *olumn-sp**i*i* m*t*o*s lik* *ol_{*olumnn*m*} to *ispl*y **t*. T** *ol_**s*ription m*t*o* in t** lo* t**l* *l*ss (**min/tool/lo*/*l*ss*s/t**