Lucene search

K
nvd[email protected]NVD:CVE-2006-4844
HistorySep 19, 2006 - 1:07 a.m.

CVE-2006-4844

2006-09-1901:07:00
CWE-94
web.nvd.nist.gov
2

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

7.5

Confidence

Low

EPSS

0.074

Percentile

94.1%

PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.

Affected configurations

Nvd
Node
clarolineclarolineRange1.7.7
OR
clarolineclarolineMatch1.2
OR
clarolineclarolineMatch1.3
OR
clarolineclarolineMatch1.4
OR
clarolineclarolineMatch1.5
OR
clarolineclarolineMatch1.5.3
OR
clarolineclarolineMatch1.5.4
OR
clarolineclarolineMatch1.6
OR
clarolineclarolineMatch1.6_beta
OR
clarolineclarolineMatch1.6_rc1
OR
clarolineclarolineMatch1.7
OR
clarolineclarolineMatch1.7.1
OR
clarolineclarolineMatch1.7.2
OR
clarolineclarolineMatch1.7.3
OR
clarolineclarolineMatch1.7.4
OR
clarolineclarolineMatch1.7.5
OR
clarolineclarolineMatch1.7.6
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.4
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.5
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.5.3
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.5.4
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.5.5
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.6.4
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.6.4_p1
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.6.5
OR
dokeosopen_source_learning_and_knowledge_management_toolMatch1.6_rc2
VendorProductVersionCPE
clarolineclaroline*cpe:2.3:a:claroline:claroline:*:*:*:*:*:*:*:*
clarolineclaroline1.2cpe:2.3:a:claroline:claroline:1.2:*:*:*:*:*:*:*
clarolineclaroline1.3cpe:2.3:a:claroline:claroline:1.3:*:*:*:*:*:*:*
clarolineclaroline1.4cpe:2.3:a:claroline:claroline:1.4:*:*:*:*:*:*:*
clarolineclaroline1.5cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*
clarolineclaroline1.5.3cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*
clarolineclaroline1.5.4cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*
clarolineclaroline1.6cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*
clarolineclaroline1.6_betacpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*
clarolineclaroline1.6_rc1cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*
Rows per page:
1-10 of 261

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

AI Score

7.5

Confidence

Low

EPSS

0.074

Percentile

94.1%