Vulnerabilities > CVE-2006-5256 - Remote File Include vulnerability in Claroline Import.lib.PHP
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
PHP remote file inclusion vulnerability in claroline/inc/lib/import.lib.php in Claroline 1.8.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the includePath parameter.
Vulnerable Configurations
Exploit-Db
description | Claroline <= 1.8.0 rc1 (import.lib.php) Remote File Include Vulnerability. CVE-2006-5256. Webapps exploit for php platform |
file | exploits/php/webapps/2510.txt |
id | EDB-ID:2510 |
last seen | 2016-01-31 |
modified | 2006-10-10 |
platform | php |
port | |
published | 2006-10-10 |
reporter | k1tk4t |
source | https://www.exploit-db.com/download/2510/ |
title | Claroline <= 1.8.0 rc1 import.lib.php Remote File Include Vulnerability |
type | webapps |
References
- http://secunia.com/advisories/22364
- http://securityreason.com/securityalert/1719
- http://securitytracker.com/id?1017044
- http://www.securityfocus.com/archive/1/448174/100/0/threaded
- http://www.securityfocus.com/bid/20444
- http://www.vupen.com/english/advisories/2006/3996
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29426
- https://www.exploit-db.com/exploits/2510