header-logo
Suggest Exploit
vendor:
Claroline
by:
Unknown
7.5
CVSS
HIGH
Remote File Include
98
CWE
Product Name: Claroline
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:claroline:claroline
Metasploit:
Other Scripts:
Platforms Tested:
2007

Remote File Include Vulnerability in Claroline

Claroline is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data. Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user-supplied data and implement proper input validation techniques. Additionally, keep the application and underlying system up to date with the latest patches and security updates.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/23609/info

Claroline is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied data.

Exploiting this issue may allow an attacker to compromise the application and the underlying system; other attacks are also possible. 

http://www.example.com//claroline/inc/lib/rootSys=Shell