Description
|
|
beford has reported multiple vulnerabilities in Chamilo, which can be exploited by malicious users to conduct script insertion attacks and bypass certain security restrictions and by malicious people to conduct cross-site scripting attacks.
1) Input appended to the URL after main/inc/lib/phpdocx/pdf/www/examples.php is nor properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
2) Input passed via the "category_name" when adding a new dropbox category is not properly sanitised before being displayed to the user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is viewed.
3) The application does not properly verify the category ID before deleting the dropbox files, which can be exploited to delete files of other users.
The vulnerabilities are reported in version 1.8.8.4. Other versions may also be affected.
|