<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Moodle_3.10.3_XSS%E6%BC%8F%E6%B4%9E</id>
	<title>Moodle 3.10.3 XSS漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=Moodle_3.10.3_XSS%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Moodle_3.10.3_XSS%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-07T20:02:02Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=Moodle_3.10.3_XSS%E6%BC%8F%E6%B4%9E&amp;diff=1884&amp;oldid=prev</id>
		<title>Pwnwiki: 建立內容為「==XSS== &lt;pre&gt; # Exploit Title: Moodle 3.10.3 - 'url' Persistent Cross Site Scripting # Date: 22/04/2021 # Exploit Author: UVision # Vendor Homepage: https://moodl…」的新頁面</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=Moodle_3.10.3_XSS%E6%BC%8F%E6%B4%9E&amp;diff=1884&amp;oldid=prev"/>
		<updated>2021-04-24T01:33:07Z</updated>

		<summary type="html">&lt;p&gt;建立內容為「==XSS== &amp;lt;pre&amp;gt; # Exploit Title: Moodle 3.10.3 - &amp;#039;url&amp;#039; Persistent Cross Site Scripting # Date: 22/04/2021 # Exploit Author: UVision # Vendor Homepage: https://moodl…」的新頁面&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==XSS==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: Moodle 3.10.3 - 'url' Persistent Cross Site Scripting&lt;br /&gt;
# Date: 22/04/2021&lt;br /&gt;
# Exploit Author: UVision&lt;br /&gt;
# Vendor Homepage: https://moodle.org/&lt;br /&gt;
# Software Link: https://download.moodle.org&lt;br /&gt;
# Version: 3.10.3&lt;br /&gt;
# Tested on: Debian/Windows 10&lt;br /&gt;
&lt;br /&gt;
By having the role of a teacher or an administrator or a manager (to have the possibility to create a course): &lt;br /&gt;
&lt;br /&gt;
- Create a new course (http://localhost/moodle/course/edit.php?category=1&amp;amp;returnto=topcat)&lt;br /&gt;
- Give any name , short name, date and other things required.&lt;br /&gt;
- In &amp;quot;Description&amp;quot; field, click on the &amp;quot;link&amp;quot; button&lt;br /&gt;
- In the url field, enter the payload : &amp;lt;img src=1 href=1 onerror=&amp;quot;javascript:alert(1)&amp;quot;&amp;gt;&amp;lt;/img&amp;gt;&lt;br /&gt;
- Create the link, an alert window appears (close it several times so that it disappears) , save the course. (&amp;quot;Save and return&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
Each time the course description is displayed, the stored xss is activated : activate it by viewing the course, by modifying it, etc.&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>