CVE-2008-3260

Multiple cross-site scripting (XSS) vulnerabilities in Claroline before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via (1) the cwd parameter in a rqMkHtml action to document/rqmkhtml.php, or the query string to (2) announcements/announcements.php, (3) calendar/agenda.php, (4) course/index.php, (5) course_description/index.php, (6) document/document.php, (7) exercise/exercise.php, (8) group/group_space.php, (9) phpbb/newtopic.php, (10) phpbb/reply.php, (11) phpbb/viewtopic.php, (12) wiki/wiki.php, or (13) work/work.php in claroline/.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:claroline:claroline:*:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.2:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.6:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.7.7:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.0:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.7:*:*:*:*:*:*:*
cpe:2.3:a:claroline:claroline:1.8.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:48

Type Values Removed Values Added
References () http://claroline.svn.sourceforge.net/viewrc/claroline/branches/1.8/claroline/?sortby=date#dirlist - () http://claroline.svn.sourceforge.net/viewrc/claroline/branches/1.8/claroline/?sortby=date#dirlist -
References () http://secunia.com/advisories/31116 - Vendor Advisory () http://secunia.com/advisories/31116 - Vendor Advisory
References () http://securityreason.com/securityalert/4020 - () http://securityreason.com/securityalert/4020 -
References () http://sourceforge.net/project/shownotes.php?release_id=613634 - () http://sourceforge.net/project/shownotes.php?release_id=613634 -
References () http://wiki.claroline.net/index.php/Changelog_1.8.x#Modification_between_claroline_1.8.9_and_1.8.10 - () http://wiki.claroline.net/index.php/Changelog_1.8.x#Modification_between_claroline_1.8.9_and_1.8.10 -
References () http://www.securityfocus.com/archive/1/494539/100/0/threaded - () http://www.securityfocus.com/archive/1/494539/100/0/threaded -
References () http://www.securityfocus.com/bid/30269 - Exploit () http://www.securityfocus.com/bid/30269 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/43854 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/43854 -

Information

Published : 2008-07-22 17:41

Updated : 2024-11-21 00:48


NVD link : CVE-2008-3260

Mitre link : CVE-2008-3260

CVE.ORG link : CVE-2008-3260


JSON object : View

Products Affected

claroline

  • claroline
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')