CVE-2005-1374

Current Description

Multiple cross-site scripting (XSS) vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to inject arbitrary web script or HTML via (1) exercise_result.php, (2) exercice_submit.php, (3) agenda.php, (4) learningPathList.php, (5) learningPathAdmin.php, (6) learningPath.php, (7) userLog.php, (8) tool parameter to toolaccess_details.php, (9) data parameter to user_access_details.php, or (10) coursePath parameter to myagenda.php.

Referenced by CVEs:CVE-2008-3315

Basic Data

PublishedMay 03, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationClarolineClaroline1.5.3*******
    2.3ApplicationClarolineClaroline1.6_beta*******
    2.3ApplicationClarolineClaroline1.6_rc1*******

Vulnerable Software List

VendorProductVersions
Claroline Claroline 1.5.3, 1.6_beta, 1.6_rc1

References

NameSourceURLTags
20050427 ZRCSA-200501 - Multiple vulnerabilities in Clarolinehttp://marc.info/?l=bugtraq&m=111464607103407&w=2BUGTRAQ
15161http://secunia.com/advisories/15161SECUNIAExploit Patch Vendor Advisory
15725http://secunia.com/advisories/15725SECUNIA
1013822http://securitytracker.com/id?1013822SECTRACKExploit Patch Vendor Advisory
http://www.claroline.net/news.php#85http://www.claroline.net/news.php#85CONFIRMExploit Patch Vendor Advisory
13407http://www.securityfocus.com/bid/13407BIDExploit Patch Vendor Advisory
claroline-multiple-scripts-xss(20295)https://exchange.xforce.ibmcloud.com/vulnerabilities/20295XF