Dokeos versions less than or equal to 1.6.4 suffer from a SQL injection vulnerability.
4f308287529bc84bf129c4b7461b1b0821bd70eeb73f1fdc9ac17b07e4eb4368
Dokeos 1.6.4 SQL Injection Vulnerability
Author: Alvaro Olavarria <aolavarria@secure.cl>
Affected: Dokeos <= 1.6.4
Status: Notified hereby
Vendor url: http://www.dokeos.com
Background.
Dokeos is an Open Source elearning and course management web application
translated in 34 languages
and helping more than 1.000 organisations worldwide to manage learning and
collaboration activities.
Vulnerability.
Dokeos was built using Claroline's code; it inherited several of its
features including an old version
of phpBB which is being used as the forum for the courses. There is a
problem in the viewtopic.php",
where the $topic variable is not correctly sanitized and $forumview is
equal to threaded", that would
allow an attacker to inject arbitrary code to the application.
Impact
An attacker could use Blind SQL Injection to gain access to privileged
data like the password hashes
for the administrator user and so on.
Proof of Concept
http://localhost/claroline/phpbb/viewtopic.php?cidReq=102&gidReq=&forum=1&0&forumview=threaded&topic=1[blind_sql_inject]
Greetings
Rodrigo Guitierrez <rodrigo@secure.cl>
University of Los Lagos in Chile "for lending the required equipment for
testing" >:D
full-disclosure@list.grok.org.uk
bugtraq@securityfocus.com, info@securiteam.com,
submissions@packetstormsecurity.org, rodrigo@secure.cl