Описание
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-4844
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28943
- http://secunia.com/advisories/21931
- http://secunia.com/advisories/21948
- http://www.claroline.net/wiki/index.php/Changelog_1.7.x#Modification_between_claroline_1.7.7_and_1.7.8
- http://www.gulftech.org/?node=research&article_id=00112-09142006
- http://www.gulftech.org/?node=research&article_id=00112-09142006&
- http://www.securityfocus.com/bid/20056
- http://www.vupen.com/english/advisories/2006/3638
- http://www.vupen.com/english/advisories/2006/3639
Связанные уязвимости
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.