Multiple cross-site scripting (XSS) vulnerabilities in Claroline before 1.11.9 allow remote attackers to inject arbitrary web script or HTML via the (1) box parameter to messaging/messagebox.php, cidToEdit parameter to (2) adminregisteruser.php or (3) admin_user_course_settings.php in admin/, (4) module_id parameter to admin/module/module.php, or (5) offset parameter to admin/right/profile_list.php.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.htbridge.com/advisory/HTB23179 | exploit |
http://packetstormsecurity.com/files/124200 | exploit |
http://secunia.com/advisories/55753 | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/89264 | vdb entry |
http://www.securitytracker.com/id/1029435 | vdb entry |
http://forum.claroline.net/viewtopic.php?f=88&t=26413 | |
http://archives.neohapsis.com/archives/bugtraq/2013-11/0139.html | mailing list exploit |