header-logo
Suggest Exploit
vendor:
Claroline
by:
Unknown
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: Claroline
Affected Version From: 1.1
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:claroline:claroline:1.10
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

HTML Injection Vulnerabilities in Claroline

Claroline is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Mitigation:

To mitigate these vulnerabilities, it is recommended to properly sanitize user-supplied input before using it in dynamically generated content. Additionally, implementing a Content Security Policy (CSP) can help prevent the execution of malicious scripts.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/47073/info

Claroline is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

Claroline 1.10 is vulnerable; other versions may also be affected. 

"><script>alert(0)</script>