CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2006-4844

PHP remote file inclusion vulnerability in inc/claro_init_local.inc.php in Claroline 1.7.7 and earlier, as used in Dokeos and possibly other products, allows remote attackers to execute arbitrary PHP code via a URL in the extAuthSource[newUser] parameter.
Publish Date : 2006-09-18 Last Update Date : 2008-09-05
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
5.1
Confidentiality Impact Partial (There is considerable informational disclosure.)
Integrity Impact Partial (Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.)
Availability Impact Partial (There is reduced performance or interruptions in resource availability.)
Access Complexity High (Specialized access conditions exist. It is hard to exploit and several special conditions must be satisfied to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access User
Vulnerability Type(s) Execute CodeFile Inclusion
CWE ID CWE id is not defined for this vulnerability

- Products Affected By CVE-2006-4844

# Product Type Vendor Product Version Update Edition Language
1 Application Claroline Claroline 1.2 Version Details Vulnerabilities
2 Application Claroline Claroline 1.3 Version Details Vulnerabilities
3 Application Claroline Claroline 1.4 Version Details Vulnerabilities
4 Application Claroline Claroline 1.5 Version Details Vulnerabilities
5 Application Claroline Claroline 1.5.3 Version Details Vulnerabilities
6 Application Claroline Claroline 1.5.4 Version Details Vulnerabilities
7 Application Claroline Claroline 1.6 Rc1 Version Details Vulnerabilities
8 Application Claroline Claroline 1.6 Beta Version Details Vulnerabilities
9 Application Claroline Claroline 1.6 Version Details Vulnerabilities
10 Application Claroline Claroline 1.7 Version Details Vulnerabilities
11 Application Claroline Claroline 1.7.1 Version Details Vulnerabilities
12 Application Claroline Claroline 1.7.2 Version Details Vulnerabilities
13 Application Claroline Claroline 1.7.3 Version Details Vulnerabilities
14 Application Claroline Claroline 1.7.4 Version Details Vulnerabilities
15 Application Claroline Claroline 1.7.5 Version Details Vulnerabilities
16 Application Claroline Claroline 1.7.6 Version Details Vulnerabilities
17 Application Claroline Claroline 1.7.7 Version Details Vulnerabilities
18 Application Dokeos Open Source Learning And Knowledge Management Tool 1.4 Version Details Vulnerabilities
19 Application Dokeos Open Source Learning And Knowledge Management Tool 1.5 Version Details Vulnerabilities
20 Application Dokeos Open Source Learning And Knowledge Management Tool 1.5.3 Version Details Vulnerabilities
21 Application Dokeos Open Source Learning And Knowledge Management Tool 1.5.4 Version Details Vulnerabilities
22 Application Dokeos Open Source Learning And Knowledge Management Tool 1.5.5 Version Details Vulnerabilities
23 Application Dokeos Open Source Learning And Knowledge Management Tool 1.6 Rc2 Version Details Vulnerabilities
24 Application Dokeos Open Source Learning And Knowledge Management Tool 1.6.4 Version Details Vulnerabilities
25 Application Dokeos Open Source Learning And Knowledge Management Tool 1.6.4 P1 Version Details Vulnerabilities
26 Application Dokeos Open Source Learning And Knowledge Management Tool 1.6.5 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Claroline Claroline 17
Dokeos Open Source Learning And Knowledge Management Tool 9

- References For CVE-2006-4844

http://www.gulftech.org/?node=research&article_id=00112-09142006
http://secunia.com/advisories/21931
SECUNIA 21931
http://www.gulftech.org/?node=research&article_id=00112-09142006&
http://www.claroline.net/wiki/index.php/Changelog_1.7.x#Modification_between_claroline_1.7.7_and_1.7.8 CONFIRM
http://www.frsirt.com/english/advisories/2006/3639
VUPEN ADV-2006-3639
http://www.securityfocus.com/bid/20056
BID 20056 Claroline Claro_Init_Local.Inc.PHP Remote File Include Vulnerability Release Date:2006-09-18
http://xforce.iss.net/xforce/xfdb/28943
XF claroline-claro-file-include(28943)
http://www.frsirt.com/english/advisories/2006/3638
VUPEN ADV-2006-3638
http://secunia.com/advisories/21948
SECUNIA 21948

- Metasploit Modules Related To CVE-2006-4844

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.