Claroline E-Learning exercises_details.php uInfo Variable SQL Injection

2005-06-19T03:15:12
ID OSVDB:17568
Type osvdb
Reporter K-C0d3r()
Modified 2005-06-19T03:15:12

Description

Vulnerability Description

Claroline E-Learning contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the exercises_details.php script not properly sanitizing user-supplied input to the uInfo variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Solution Description

Upgrade to version 1.6 RC2 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Claroline E-Learning contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the exercises_details.php script not properly sanitizing user-supplied input to the uInfo variable. This may allow an attacker to inject or manipulate SQL queries in the backend database.

Manual Testing Notes

http://[victim]/$path/exercises_details.php?uInfo='SQL Injection'

References:

Vendor URL: http://www.claroline.net/ Secunia Advisory ID:15725 Other Advisory URL: http://www.securiteam.com/exploits/5YP0C2KG0U.html ISS X-Force ID: 20298 CVE-2005-1375 Bugtraq ID: 13407