Multiple SQL injection vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to execute arbitrary SQL commands via (1) learningPath.php, (2) learningPathAdmin.php, (3) learnPath_details.php, (4) modules_pool.php, (5) module.php, (6) uInfo parameter in userInfo.php, or (7) exo_id parameter to exercises_details.php.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/13407 | patch vdb entry exploit |
http://secunia.com/advisories/15161 | patch third party advisory exploit |
http://marc.info/?l=bugtraq&m=111464607103407&w=2 | mailing list |
http://www.claroline.net/news.php#85 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20298 | vdb entry |
http://securitytracker.com/id?1013822 | patch vdb entry exploit |
http://secunia.com/advisories/15725 | third party advisory |