Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to inject arbitrary web script or HTML via (1) exercise_result.php, (2) exercice_submit.php, (3) agenda.php, (4) learningPathList.php, (5) learningPathAdmin.php, (6) learningPath.php, (7) userLog.php, (8) tool parameter to toolaccess_details.php, (9) data parameter to user_access_details.php, or (10) coursePath parameter to myagenda.php.
References
Link | Resource |
---|---|
http://www.claroline.net/news.php#85 | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/13407 | Exploit Patch Vendor Advisory |
http://securitytracker.com/id?1013822 | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/15161 | Exploit Patch Vendor Advisory |
http://secunia.com/advisories/15725 | |
http://marc.info/?l=bugtraq&m=111464607103407&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/20295 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-05-02 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-1374
Mitre link : CVE-2005-1374
JSON object : View
CWE
Products Affected
claroline
- claroline