Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the (1) query string to (a) announcements/messages.php; (b) lostPassword.php and (c) profile.php in auth/; (d) calendar/myagenda.php; (e) group/group.php; (f) learningPath.php, (g) learningPathList.php, and (h) module.php in learnPath/; (i) phpbb/index.php; (j) courseLog.php, (k) course_access_details.php, (l) delete_course_stats.php, (m) userLog.php, and (n) user_access_details.php in tracking/; (o) user/user.php; and (p) user/userInfo.php; the (2) view parameter to (q) tracking/courseLog.php; and the (3) toolId parameter to (r) tracking/toolaccess_details.php. NOTE: this may overlap CVE-2006-3257 and CVE-2005-1374.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/494655/100/0/threaded | mailing list |
http://www.securityfocus.com/bid/30346 | patch vdb entry exploit |
http://securityreason.com/securityalert/4041 | third party advisory |
http://secunia.com/advisories/31201 | third party advisory vendor advisory |
http://sourceforge.net/project/shownotes.php?release_id=615030 | patch |
http://wiki.claroline.net/index.php/Changelog_1.8.x#Modification_between_claroline_1.8.10_and_1.8.11 | |
http://www.vupen.com/english/advisories/2008/2167/references | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43962 | vdb entry |