Vulnerabilities > CVE-2006-7048 - Remote Security vulnerability in Claroline 1.7.5

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
claroline
exploit available

Summary

Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) clarolineRepositorySys parameter to (a) atutor.inc.php (b) db-generic.inc.php (c) docebo.inc.php (d) dokeos.1.6.inc.php (e) dokeos.inc.php (f) ganesha.inc.php (g) mambo.inc.php (h) moodle.inc.php (i) phpnuke.inc.php (j) postnuke.inc.php and (k) spip.inc.php in claroline/auth/extauth/drivers/; (2) includePath parameter in mambo.inc.php, postnuke.inc.php, and (l) inc/lib/event/init_event_manager.inc.php; and (3) rootSys parameter in (m) inc/lib/export_exe_tracking.class.php, a different set of vectors than CVE-2006-2284.

Vulnerable Configurations

Part Description Count
Application
Claroline
1

Exploit-Db

descriptionClaroline e-Learning 1.75 (ldap.inc.php) Remote File Inclusion Exploit. CVE-2006-2284,CVE-2006-7048. Webapps exploit for php platform
fileexploits/php/webapps/1766.pl
idEDB-ID:1766
last seen2016-01-31
modified2006-05-08
platformphp
port
published2006-05-08
reporterbeford
sourcehttps://www.exploit-db.com/download/1766/
titleClaroline e-Learning 1.75 ldap.inc.php Remote File Inclusion Exploit
typewebapps