Vulnerabilities > CVE-2006-7048 - Unspecified vulnerability in Claroline 1.7.5

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
claroline
exploit available

Summary

Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) clarolineRepositorySys parameter to (a) atutor.inc.php (b) db-generic.inc.php (c) docebo.inc.php (d) dokeos.1.6.inc.php (e) dokeos.inc.php (f) ganesha.inc.php (g) mambo.inc.php (h) moodle.inc.php (i) phpnuke.inc.php (j) postnuke.inc.php and (k) spip.inc.php in claroline/auth/extauth/drivers/; (2) includePath parameter in mambo.inc.php, postnuke.inc.php, and (l) inc/lib/event/init_event_manager.inc.php; and (3) rootSys parameter in (m) inc/lib/export_exe_tracking.class.php, a different set of vectors than CVE-2006-2284.

Vulnerable Configurations

Part Description Count
Application
Claroline
1

Exploit-Db

descriptionClaroline e-Learning 1.75 (ldap.inc.php) Remote File Inclusion Exploit. CVE-2006-2284,CVE-2006-7048. Webapps exploit for php platform
fileexploits/php/webapps/1766.pl
idEDB-ID:1766
last seen2016-01-31
modified2006-05-08
platformphp
port
published2006-05-08
reporterbeford
sourcehttps://www.exploit-db.com/download/1766/
titleClaroline e-Learning 1.75 ldap.inc.php Remote File Inclusion Exploit
typewebapps