First published: Tue Sep 19 2006(Updated: )
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Dokeos Open Source Learning And Knowledge Management Tool | =1.5 | |
Claroline Claroline | =1.7.5 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.6_rc2 | |
Claroline Claroline | =1.7.4 | |
Claroline Claroline | =1.5.4 | |
Claroline Claroline | =1.2 | |
Claroline Claroline | <=1.7.7 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.5.3 | |
Claroline Claroline | =1.6_beta | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.6.4 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.5.5 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.5.4 | |
Claroline Claroline | =1.7 | |
Claroline Claroline | =1.6_rc1 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.6.5 | |
Claroline Claroline | =1.7.1 | |
Claroline Claroline | =1.3 | |
Claroline Claroline | =1.7.6 | |
Claroline Claroline | =1.4 | |
Claroline Claroline | =1.5 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.4 | |
Claroline Claroline | =1.6 | |
Claroline Claroline | =1.5.3 | |
Claroline Claroline | =1.7.3 | |
Dokeos Open Source Learning And Knowledge Management Tool | =1.6.4_p1 | |
Claroline Claroline | =1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.