Description
Chamilo is a learning management system. Prior to version 1.11.30, the open parameter of help.php fails to properly sanitize user input. This allows an attacker to inject arbitrary HTML, such as underlined text, via a crafted URL. This issue has been patched in version 1.11.30.
Problem types
CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Product status
References
github.com/...lo-lms/security/advisories/GHSA-6fmm-qrx4-wgqc
github.com/...ommit/083b1d2b0c29b0cc0313a28165ad47bebae9dcb2
github.com/...ommit/1ee2d8bb61b67e08946cd80b1a9b92c1a9959c7b
github.com/chamilo/chamilo-lms/releases/tag/v1.11.30