Vulnerability CVE-2006-4844


Published: 2006-09-18   Modified: 2012-02-12

Description:
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.

See advisories in our WLB2 database:
Topic
Author
Date
Low
Claroline < 1.7.7 Arbitrary File Inclusion
GulfTech
20.01.2018

Type:

CWE-94

(Improper Control of Generation of Code ('Code Injection'))

CVSS2 => (AV:N/AC:H/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5.1/10
6.4/10
4.9/10
Exploit range
Attack complexity
Authentication
Remote
High
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Dokeos -> Open source learning and knowledge management tool 
Claroline -> Claroline 

 References:
http://xforce.iss.net/xforce/xfdb/28943
http://www.securityfocus.com/bid/20056
http://www.claroline.net/wiki/index.php/Changelog_1.7.x#Modification_between_claroline_1.7.7_and_1.7.8
http://secunia.com/advisories/21931
http://www.vupen.com/english/advisories/2006/3639
http://www.vupen.com/english/advisories/2006/3638
http://www.gulftech.org/?node=research&article_id=00112-09142006&
;
http://www.gulftech.org/?node=research&article_id=00112-09142006
http://secunia.com/advisories/21948

Copyright 2024, cxsecurity.com

 

Back to Top