Claroline learningPath.php Multiple Variable SQL Injection

2005-04-27T08:26:58
ID OSVDB:16530
Type osvdb
Reporter Sieg Fried(Siegfried@zone-h.org)
Modified 2005-04-27T08:26:58

Description

Vulnerability Description

Claroline contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the multiple variables in the learningPath.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.

Solution Description

Upgrade to version 1.5.4, 1.6 final or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Claroline contains a flaw that may allow an attacker to inject arbitrary SQL queries. The issue is due to the multiple variables in the learningPath.php script not being properly sanitized and may allow an attacker to inject or manipulate SQL queries.

References:

Vendor URL: http://www.claroline.net/ Vendor Specific Advisory URL Security Tracker: 1013822 Secunia Advisory ID:15161 Related OSVDB ID: 16520 Related OSVDB ID: 16532 Related OSVDB ID: 16539 Related OSVDB ID: 16531 Related OSVDB ID: 16534 Related OSVDB ID: 16536 Related OSVDB ID: 16537 Related OSVDB ID: 16535 Related OSVDB ID: 16533 Other Advisory URL: http://www.zone-h.org/advisories/read/id=7472 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-04/0467.html Keyword: Zone-H Research Center Security Advisory 200501 ISS X-Force ID: 20298 CVE-2005-1375 Bugtraq ID: 13407