{ "schema_version": "1.4.0", "id": "GHSA-27c2-38w3-cj23", "modified": "2022-05-01T06:57:44Z", "published": "2022-05-01T06:57:44Z", "aliases": [ "CVE-2006-2286" ], "details": "Multiple PHP remote file inclusion vulnerabilities in claro_init_global.inc.php in Dokeos 1.6.3 and earlier, and Dokeos community release 2.0.3, allow remote attackers to execute arbitrary PHP code via a URL in the (1) rootSys and (2) clarolineRepositorySys parameters, and possibly the (3) lang_path, (4) extAuthSource, (5) thisAuthSource, (6) main_configuration_file_path, (7) phpDigIncCn, and (8) drs parameters to (a) testheaderpage.php and (b) resourcelinker.inc.php.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2286" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25740" }, { "type": "WEB", "url": "http://secunia.com/advisories/19576" }, { "type": "WEB", "url": "http://www.dokeos.com/forum/viewtopic.php?t=6848" }, { "type": "WEB", "url": "http://www.dokeos.com/wiki/index.php/Security" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2006/1303" } ], "database_specific": { "cwe_ids": [ "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2006-05-10T02:14:00Z" } }