- Description
- Multiple PHP remote file inclusion vulnerabilities in claro_init_global.inc.php in Dokeos 1.6.3 and earlier, and Dokeos community release 2.0.3, allow remote attackers to execute arbitrary PHP code via a URL in the (1) rootSys and (2) clarolineRepositorySys parameters, and possibly the (3) lang_path, (4) extAuthSource, (5) thisAuthSource, (6) main_configuration_file_path, (7) phpDigIncCn, and (8) drs parameters to (a) testheaderpage.php and (b) resourcelinker.inc.php.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-94
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dokeos:dokeos:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AA71F2ED-1ECD-4220-9726-5D50503EDD24",
"versionEndIncluding": "1.6.3"
},
{
"criteria": "cpe:2.3:a:dokeos:dokeos_community_release:2.0.3:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D6807D3D-7B50-419C-A22E-78BD29BA079A"
}
],
"operator": "OR"
}
]
}
]