Vulnerabilities > CVE-2005-1374 - Remote Input Validation vulnerability in Claroline 1.5.3/1.6Beta/1.6Rc1
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to inject arbitrary web script or HTML via (1) exercise_result.php, (2) exercice_submit.php, (3) agenda.php, (4) learningPathList.php, (5) learningPathAdmin.php, (6) learningPath.php, (7) userLog.php, (8) tool parameter to toolaccess_details.php, (9) data parameter to user_access_details.php, or (10) coursePath parameter to myagenda.php.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 3 |
Exploit-Db
description Claroline 1.5/1.6 myagenda.php coursePath Parameter XSS. CVE-2005-1374. Webapps exploit for php platform id EDB-ID:25551 last seen 2016-02-03 modified 2005-04-27 published 2005-04-27 reporter Sieg Fried source https://www.exploit-db.com/download/25551/ title Claroline 1.5/1.6 myagenda.php coursePath Parameter XSS description Claroline 1.5/1.6 toolaccess_details.php tool Parameter XSS. CVE-2005-1374. Webapps exploit for php platform id EDB-ID:25549 last seen 2016-02-03 modified 2005-04-27 published 2005-04-27 reporter Sieg Fried source https://www.exploit-db.com/download/25549/ title Claroline 1.5/1.6 toolaccess_details.php tool Parameter XSS description Claroline 1.5/1.6 user_access_details.php data Parameter XSS. CVE-2005-1374. Webapps exploit for php platform id EDB-ID:25550 last seen 2016-02-03 modified 2005-04-27 published 2005-04-27 reporter Sieg Fried source https://www.exploit-db.com/download/25550/ title Claroline 1.5/1.6 user_access_details.php data Parameter XSS
Nessus
NASL family | CGI abuses |
NASL id | CLAROLINE_MULT_VULNS.NASL |
description | The version of Claroline (an open source, collaborative learning environment) installed on the remote host suffers from a number of remotely-exploitable vulnerabilities, including: - Multiple Remote File Include Vulnerabilities Four scripts let an attacker read arbitrary files on the remote host and possibly even run arbitrary PHP code, subject to the privileges of the web server user. - Multiple SQL Injection Vulnerabilities Seven scripts let an attacker inject arbitrary input into SQL statements, potentially revealing sensitive data or altering them. - Multiple Cross-Site Scripting Vulnerabilities An attacker can pass arbitrary HTML and script code through any of 10 flawed scripts and potentially have that code executed by a user |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18165 |
published | 2005-04-29 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18165 |
title | Claroline < 1.5.4 / 1.6.0 Multiple Vulnerabilities (RFI, SQLi, XSS, Traversal) |
code |
|