Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-qv6c-367r-3w6q: XBlock vulnerable to Cross-Site Scripting (XSS)

Impact

XSS Vulnerability in multiple XBlock Fields. Any platform that has deployed the XBlock will be impacted.

Patches

https://github.com/openedx/xblock-drag-and-drop-v2/commit/53c4482f9bb6d8c7ccdf5253bd82c84a222b2492

The fix is compatible with all Open edX releases newer than Lilac.

Workarounds

None.

References

https://github.com/openedx/xblock-drag-and-drop-v2/pull/295#issuecomment-1277693864

ghsa
#xss#vulnerability#git

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

*   Explore
*   All features
*   Documentation
*   GitHub Skills
*   Blog
    • For

    • Enterprise

    • Teams

    • Startups

    • Education

    • By Solution

    • CI/CD & Automation

    • DevOps

    • DevSecOps

    • Case Studies

    • Customer Stories

    • Resources

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
    

*   Repositories
*   Topics
*   Trending
*   Collections
  • Pricing
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. CVE-2022-46147

XBlock vulnerable to Cross-Site Scripting (XSS)

Package

pip xblock-drag-and-drop-v2 (pip)

Affected versions

< 3.0.0

Description

Severity

CVSS base metrics

User interaction

Required

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

Weaknesses

GHSA ID

GHSA-qv6c-367r-3w6q

Source code

Related news

CVE-2022-46147: XSS Issues in Xblock Input Fields

Drag and Drop XBlock v2 implements a drag-and-drop style problem, where a learner has to drag items to zones on a target image. Versions prior to 3.0.0 are vulnerable to cross-site scripting in multiple XBlock Fields. Any platform that has deployed the XBlock may be impacted. Version 3.0.0 contains a patch for this issue. There are no known workarounds.