Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12158
HistoryApr 11, 2006 - 12:00 a.m.

[Full-disclosure] Dokeos 1.6.4 SQL Injection Vulnerability

2006-04-1100:00:00
vulners.com
9

Dokeos 1.6.4 SQL Injection Vulnerability

Author: Alvaro Olavarria <[email protected]>

Affected: Dokeos <= 1.6.4
Status: Notified hereby
Vendor url: http://www.dokeos.com

Background.

Dokeos is an Open Source elearning and course management web application
translated in 34 languages
and helping more than 1.000 organisations worldwide to manage learning and
collaboration activities.

Vulnerability.

Dokeos was built using Claroline's code; it inherited several of its
features including an old version
of phpBB which is being used as the forum for the courses. There is a
problem in the “viewtopic.php",
where the $topic variable is not correctly sanitized and $forumview is
equal to “threaded", that would
allow an attacker to inject arbitrary code to the application.

Impact

An attacker could use Blind SQL Injection to gain access to privileged
data like the password hashes
for the administrator user and so on.

Proof of Concept

http://localhost/claroline/phpbb/viewtopic.php?cidReq=102&amp;gidReq=&amp;forum=1&amp;0&amp;forumview=threaded&amp;topic=1[blind_sql_inject]

Greetings

Rodrigo Guitierrez <[email protected]>
University of Los Lagos in Chile "for lending the required equipment for
testing" >:D


Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/