---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Dokeos Multiple Vulnerabilities SECUNIA ADVISORY ID: SA34879 VERIFY ADVISORY: http://secunia.com/advisories/34879/ DESCRIPTION: Some vulnerabilities have been reported in Dokeos, which can be exploited by malicious users to disclose potentially sensitive information and conduct SQL injection or script insertion attacks, and by malicious people to conduct cross-site scripting and request forgery attacks. 1) Input passed to the "search_term" parameter in main/auth/courses.php (if action is set to "subscribe") is not properly sanitised before being returned to the user. 2) Input passed to the "frm_title" and "frm_content" parameters when adding a new personal agenda item is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site when the malicious agenda item is displayed. Note: Personal agenda items are usually not accessible to other members. 3) The application allows users to perform certain actions via HTTP requests without performing any validation checks to verify the requests. This can be exploited to e.g. add new personal agenda items when a logged in user views a malicious web page. Note: In combination with vulnerability #2, this can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 4) Input passed to the "title" and "tutor_name" parameters when adding a new course is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site when the malicious course data is displayed. Successful exploitation requires privileges to create a new course. 5) Input passed to the "student" and "course" parameters in main/mySpace/myStudents.php is not properly sanitised before being used in SQL queries. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 6) Input passed to the "student" and "course" parameters in main/mySpace/myStudents.php is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 7) Some vulnerabilities are caused due to unspecified errors, which can be exploited to e.g. disclose arbitrary files via directory traversal attacks. Further information is currently not available. SOLUTION: Apply patch. http://www.dokeos.com/download/security/20090512/patch-dokeos-1.8.5-20090512.zip PROVIDED AND/OR DISCOVERED BY: 1-6) Russ McRee 7) The vendor credits Gerendi Sandor Attila ORIGINAL ADVISORY: Dokeos: http://www.dokeos.com/wiki/index.php/Security#Dokeos_1.8 Russ McRee HIO-2009-0416: http://holisticinfosec.org/content/view/112/45/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------