How to Buy
This script is Copyright (C) 2005-2015 Tenable Network Security, Inc.
The remote host contains a PHP script that is prone to cross-site
The remote version of Claroline fails to sanitize user input to
several parameters of the 'add_course.php' script. Using a
specially crafted URL, an attacker may be able to exploit this issue
to perform cross-site scripting attacks against users of the affected
See also :
Upgrade as necessary to Claroline 1.5.3 and apply the
claroline153fix01.zip patch referenced in the advisory above.
Risk factor :
Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 3.7
Public Exploit Available : true
Family: CGI abuses : XSS
Nessus Plugin ID: 16318 (claroline_xss.nasl)
Bugtraq ID: 12449
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.