Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) clarolineRepositorySys parameter in ldap.inc.php and the (2) claro_CasLibPath parameter in casProcess.inc.php.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Claroline | Claroline | 1.5 (including) | 1.5 (including) |
Claroline | Claroline | 1.5.3 (including) | 1.5.3 (including) |
Claroline | Claroline | 1.5.4 (including) | 1.5.4 (including) |
Claroline | Claroline | 1.6 (including) | 1.6 (including) |
Claroline | Claroline | 1.6_beta (including) | 1.6_beta (including) |
Claroline | Claroline | 1.6_rc1 (including) | 1.6_rc1 (including) |
Claroline | Claroline | 1.7.2 (including) | 1.7.2 (including) |
Claroline | Claroline | 1.7.4 (including) | 1.7.4 (including) |
Claroline | Claroline | 1.7.5 (including) | 1.7.5 (including) |
Dokeos | Dokeos | 1.4 (including) | 1.4 (including) |
Dokeos | Dokeos | 1.5 (including) | 1.5 (including) |
Dokeos | Dokeos | 1.5.3 (including) | 1.5.3 (including) |
Dokeos | Dokeos | 1.5.4 (including) | 1.5.4 (including) |
Dokeos | Dokeos | 1.5.5 (including) | 1.5.5 (including) |
Dokeos | Dokeos | 1.6.4 (including) | 1.6.4 (including) |
Dokeos | Dokeos | 1.6_rc2 (including) | 1.6_rc2 (including) |