| VID |
21572 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Claroline software is vulnerable to a cross-site scripting vulnerability in the add_course.php script. Claroline is an Open Source software based on PHP/MySQL. It's a collaborative learning environment allowing teachers or education institutions to create and administer courses through the Web. Claroline versions 1.5 through 1.5.3 are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the "wantedCode", "faculte", "intitule", "languageCourse", "titulaires", and "email" parameters of the add_course.php script. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://secunia.com/advisories/14131/
* Platforms Affected: Claroline GPL Open Source Project, Claroline versions 1.5 through 1.5.3 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Claroline (1.5.4 or 1.6 final or later), available from the Claroline Download Web site at http://sourceforge.net/projects/claroline-pack/ |
| Related URL |
(CVE) |
| Related URL |
12449 (SecurityFocus) |
| Related URL |
19224 (ISS) |
|