Claroline 1.10 - Persistent Cross-Site Scripting
Author: AutoSec Tools
type: webapps
platform: php
port:
date_added: 2011-03-29
date_updated: 2011-03-29
verified: 1
codes: OSVDB-71312
tags:
aliases:
screenshot_url:
application_url: http://www.exploit-db.comclaroline1100.tar.gz
------------------------------------------------------------------------
Software................Claroline 1.10
Vulnerability...........Persistent Cross-site Scripting
Threat Level............Moderate (2/5)
Download................http://www.claroline.net/
Disclosure Date.........4/6/2011
Tested On...............Windows Vista + XAMPP
------------------------------------------------------------------------
Author..................AutoSec Tools
Site....................http://www.autosectools.com/
Email...................John Leitch <john@autosectools.com>
------------------------------------------------------------------------
--Description--
A persistent cross-site scripting vulnerability in Claroline 1.10 can
be exploited to execute arbitrary JavaScript.
--Exploit--
Enter script tags for the first or last name of a user. The tags are
rendered unencoded when viewed in the administration user list.
--PoC--
"><script>alert(0)</script>