[<prev] [next>] [day] [month] [year] [list]
Message-ID: <50544.201.221.203.126.1144720020.squirrel@www.rgsc.cl>
Date: Mon, 10 Apr 2006 21:47:00 -0400 (CLT)
From: "Alvaro Olavarria" <aolavarria@...ure.cl>
To: full-disclosure@...ts.grok.org.uk
Cc: rodrigo@...ure.cl, info@...uriteam.com, bugtraq@...urityfocus.com,
submissions@...ketstormsecurity.org
Subject: Dokeos 1.6.4 SQL Injection Vulnerability
Dokeos 1.6.4 SQL Injection Vulnerability
Author: Alvaro Olavarria <aolavarria@...ure.cl>
Affected: Dokeos <= 1.6.4
Status: Notified hereby
Vendor url: http://www.dokeos.com
Background.
Dokeos is an Open Source elearning and course management web application
translated in 34 languages
and helping more than 1.000 organisations worldwide to manage learning and
collaboration activities.
Vulnerability.
Dokeos was built using Claroline's code; it inherited several of its
features including an old version
of phpBB which is being used as the forum for the courses. There is a
problem in the “viewtopic.php",
where the $topic variable is not correctly sanitized and $forumview is
equal to “threaded", that would
allow an attacker to inject arbitrary code to the application.
Impact
An attacker could use Blind SQL Injection to gain access to privileged
data like the password hashes
for the administrator user and so on.
Proof of Concept
http://localhost/claroline/phpbb/viewtopic.php?cidReq=102&gidReq=&forum=1&0&forumview=threaded&topic=1[blind_sql_inject]
Greetings
Rodrigo Guitierrez <rodrigo@...ure.cl>
University of Los Lagos in Chile "for lending the required equipment for
testing" >:D
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists