CVE-2006-2284

Current Description

Multiple PHP remote file inclusion vulnerabilities in Claroline 1.7.5 allow remote attackers to execute arbitrary PHP code via a URL in the (1) clarolineRepositorySys parameter in ldap.inc.php and the (2) claro_CasLibPath parameter in casProcess.inc.php.

Evaluator Description

Successful exploitation requires that "register_globals" is enabled.

Referenced by CVEs:CVE-2006-7048

Basic Data

PublishedMay 10, 2006
Last ModifiedOctober 18, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityMEDIUM
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactPARTIAL
CVSS 2 - Base Score6.8
SeverityMEDIUM
Exploitability Score8.6
Impact Score6.4
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegetrue

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationClarolineClaroline1.5*******
    2.3ApplicationClarolineClaroline1.5.3*******
    2.3ApplicationClarolineClaroline1.5.4*******
    2.3ApplicationClarolineClaroline1.6*******
    2.3ApplicationClarolineClaroline1.6_beta*******
    2.3ApplicationClarolineClaroline1.6_rc1*******
    2.3ApplicationClarolineClaroline1.7.2*******
    2.3ApplicationClarolineClaroline1.7.4*******
    2.3ApplicationClarolineClaroline1.7.5*******
    2.3ApplicationDokeosDokeos1.4*******
    2.3ApplicationDokeosDokeos1.5*******
    2.3ApplicationDokeosDokeos1.5.3*******
    2.3ApplicationDokeosDokeos1.5.4*******
    2.3ApplicationDokeosDokeos1.5.5*******
    2.3ApplicationDokeosDokeos1.6.4*******
    2.3ApplicationDokeosDokeos1.6_rc2*******

Vulnerable Software List

VendorProductVersions
Dokeos Dokeos 1.4, 1.5, 1.5.3, 1.5.4, 1.5.5, 1.6.4, 1.6_rc2
Claroline Claroline 1.5, 1.5.3, 1.5.4, 1.6, 1.6_beta, 1.6_rc1, 1.7.2, 1.7.4, 1.7.5

References

NameSourceURLTags
20003http://secunia.com/advisories/20003SECUNIAPATCH Vendor Advisory
875http://securityreason.com/securityalert/875SREASON
25316http://www.osvdb.org/25316OSVDB
20060508 Claroline Open Source e-Learning 1.7.5 Remote File Includehttp://www.securityfocus.com/archive/1/433249/100/0/threadedBUGTRAQ
17873http://www.securityfocus.com/bid/17873BIDExploit PATCH
ADV-2006-1701http://www.vupen.com/english/advisories/2006/1701VUPEN
claroline-ldapinc-casprocessinc-file-include(26280)https://exchange.xforce.ibmcloud.com/vulnerabilities/26280XF
1766https://www.exploit-db.com/exploits/1766EXPLOIT-DB