[<prev] [next>] [day] [month] [year] [list]
Message-ID: <47059.81.56.162.201.1143799076.squirrel@webmail.zone-h.fr>
Date: Fri Mar 31 15:28:12 2006
From: admin at zone-h.fr (Siegfried)
Subject: Claroline <= 1.7.4 (scormExport.inc.php) Remote
Code Execution Exploit by rgod
I just wanted to comment rgod's Claroline <= 1.7.4 (scormExport.inc.php)
Remote Code Execution Exploit:
http://www.milw0rm.com/exploits/1627
http://retrogod.altervista.org/claroline_174_incl_xpl.html
http://secunia.com/advisories/19461/
The file inclusion vulnerability just affects the 1.7 branch, however when
installing claroline it says to turn register_globals on and older
versions were _just_ working with register_globals set to on (if i
remember well), so huh.. many are probably vuln.
About the xss, it is an xss in the php error message, there are many php
functions returning errors without filtering them, anybody noted that?
Powered by blists - more mailing lists