Описание
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
Ссылки
- ExploitPatchVendor Advisory
- Vendor Advisory
- Patch
- Exploit
- Patch
- Vendor Advisory
- Vendor Advisory
- ExploitPatchVendor Advisory
- Vendor Advisory
- Patch
- Exploit
- Patch
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.7 (включая)
Одно из
cpe:2.3:a:claroline:claroline:*:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.2:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.4:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6.4:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6.4_p1:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6.5:*:*:*:*:*:*:*
cpe:2.3:a:dokeos:open_source_learning_and_knowledge_management_tool:1.6_rc2:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.07725
Низкий
5.1 Medium
CVSS2
Дефекты
CWE-94
Связанные уязвимости
github
почти 4 года назад
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
EPSS
Процентиль: 92%
0.07725
Низкий
5.1 Medium
CVSS2
Дефекты
CWE-94