CVE-2006-4844
Current Description
PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
Evaluator Description
Successful exploitation requires that "register_globals" is enabled.This vulnerability is addressed in the following product release:Claroline, Claroline, 1.7.8
Basic Data
Published | September 19, 2006 |
---|---|
Last Modified | July 20, 2017 |
Assigner | cve@mitre.org |
Data Type | CVE |
Data Format | MITRE |
Data Version | 4.0 |
Problem Type | CWE-94 |
CVE Data Version | 4.0 |
Base Metric V2
CVSS 2 - Version | 2.0 |
---|---|
CVSS 2 - Vector String | AV:N/AC:H/Au:N/C:P/I:P/A:P |
CVSS 2 - Access Vector | NETWORK |
CVSS 2 - Access Complexity | HIGH |
CVSS 2 - Authentication | NONE |
CVSS 2 - Confidentiality Impact | PARTIAL |
CVSS 2 - Availability Impact | PARTIAL |
CVSS 2 - Base Score | 5.1 |
Severity | MEDIUM |
Exploitability Score | 4.9 |
Impact Score | 6.4 |
Obtain All Privilege | false |
Obtain User Privilege | false |
Obtain Other Privilege | true |
Base Metric V3
No data provided.
Configurations
-
OR - Configuration 1
Cpe Version Part Vendor Product Version Update Edition Language SW Edition Target SW Target HW Other Version Start Including Version End Including Version Start Excluding Version End Excluding 2.3 Application Claroline Claroline 1.2 * * * * * * *