- Description
- Multiple SQL injection vulnerabilities in Claroline 1.5.3 through 1.6 Release Candidate 1, and possibly Dokeos, allow remote attackers to execute arbitrary SQL commands via (1) learningPath.php, (2) learningPathAdmin.php, (3) learnPath_details.php, (4) modules_pool.php, (5) module.php, (6) uInfo parameter in userInfo.php, or (7) exo_id parameter to exercises_details.php.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:claroline:claroline:1.5.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "88E5AD48-31AA-4A9E-969A-6E45E4B6F827"
},
{
"criteria": "cpe:2.3:a:claroline:claroline:1.6_beta:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B3FF8764-0B6C-439B-9333-473F54B9921A"
},
{
"criteria": "cpe:2.3:a:claroline:claroline:1.6_rc1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A58F1F26-B87D-4445-AB31-0648A7B32E3F"
}
],
"operator": "OR"
}
]
}
]