Description
|
|
Multiple vulnerabilities have been identified in Claroline, which could be exploited by attackers to execute arbitrary scripting code. These issues are caused by input validation errors in the "announcements/messages.php", "auth/lostPassword.php", "auth/profile.php", "calendar/myagenda.php", "group/group.php", "learnPath/learningPath.php", "learnPath/learningPathList.php", "learnPath/module.php", "phpbb/index.php", "tracking/courseLog.php", "tracking/course_access_details.php", "tracking/delete_course_stats.php", "tracking/userLog.php", "tracking/user_access_details.php", "user/user.php", "user/userInfo.php" and "toolaccess_details.php" script when processing user-supplied URLs and parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
|