Description
Open redirect vulnerability in claroline/redirector.php in Claroline before 1.8.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Digital Security Research Group · textwebappsphp
https://www.exploit-db.com/exploits/32071
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/494539/100/0/threaded
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/4020
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/30269
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/43854
Product x_refsource_confirm
http://sourceforge.net/project/shownotes.php?release_id=613634
Third Party Advisory x_refsource_confirm
http://wiki.claroline.net/index.php/Changelog_1.8.x#Modification_between_claroline_1.8.9_and_1.8.10
Scores
EPSS
0.0433
EPSS Percentile
89.0%
Details
CWE
CWE-59
Status
published
Products (27)
claroline/claroline
1.2
claroline/claroline
1.3
claroline/claroline
1.4
claroline/claroline
1.5
claroline/claroline
1.5.3
claroline/claroline
1.5.4
claroline/claroline
1.6
claroline/claroline
1.6_beta
claroline/claroline
1.6_rc1
claroline/claroline
1.7
... and 17 more
Published
Jul 22, 2008
Tracked Since
Feb 18, 2026