CVE-2006-1594

Multiple directory traversal vulnerabilities in document/rqmkhtml.php in Claroline 1.7.4 and earlier allow remote attackers to use ".." (dot dot) sequences to (1) read arbitrary files via the file parameter in a rqEditHtml command to document/rqmkhtml.php or (2) execute arbitrary code via the includePath parameter to learnPath/include/scormExport.inc.php.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:claroline:claroline:*:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.2:*:*:*:*:*:*:*

History

21 Nov 2024, 00:09

Type Values Removed Values Added
References () http://retrogod.altervista.org/claroline_174_incl_xpl.html - Exploit () http://retrogod.altervista.org/claroline_174_incl_xpl.html - Exploit
References () http://secunia.com/advisories/19461 - Exploit, Vendor Advisory () http://secunia.com/advisories/19461 - Exploit, Vendor Advisory
References () http://www.securityfocus.com/bid/17343 - () http://www.securityfocus.com/bid/17343 -
References () http://www.vupen.com/english/advisories/2006/1187 - () http://www.vupen.com/english/advisories/2006/1187 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25561 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25561 -
References () https://www.exploit-db.com/exploits/1627 - () https://www.exploit-db.com/exploits/1627 -

Information

Published : 2006-04-03 10:04

Updated : 2024-11-21 00:09


NVD link : CVE-2006-1594

Mitre link : CVE-2006-1594

CVE.ORG link : CVE-2006-1594


JSON object : View

Products Affected

claroline

  • claroline