Automate Recon and scanning process with Vidoc. All security teams in one place
By kannthu
The "Moodle Jsmol - Cross-Site Scripting" module is designed to detect a cross-site scripting vulnerability in Moodle, a popular learning management system. This module focuses specifically on the Jsmol plugin used in Moodle. The severity of this vulnerability is classified as medium.
This module was authored by madrobot.
A cross-site scripting vulnerability allows attackers to inject malicious scripts into web pages viewed by other users. In the case of Moodle, this vulnerability in the Jsmol plugin could potentially lead to unauthorized access, data theft, or the execution of arbitrary code within the context of the affected user's browser.
The "Moodle Jsmol - Cross-Site Scripting" module works by sending a specific HTTP request to the vulnerable endpoint in the Jsmol plugin. The request path is /filter/jmol/js/jsmol/php/jsmol.php?call=saveFile&data=<script>alert('XSS')</script>&mimetype=text/html
.
The module then applies several matching conditions to determine if the vulnerability is present:
- The HTTP response status must be 200. - The response body must contain the string<script>alert('XSS')</script>
.
- The response header must include the string text/html
.
If all of these conditions are met, the module reports the presence of the cross-site scripting vulnerability in the Jsmol plugin of Moodle.