Korean
<< Back
VID 210075
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Claroline software is vulnerable to a local file include vulnerability via the 'language' parameter. Claroline is an Open Source software based on PHP/MySQL. It's a collaborative learning environment allowing teachers or education institutions to create and administer courses through the Web. Claroline versions prior to 1.8.6 are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input to the 'language' parameter in the 'claroline/inc/lib/language.lib.php' script. Regardless of PHP's 'register_globals' setting, by sending a specially-crafted request to the index.php script containing "dot dot" sequences (/../) in the language parameter, a remote attacker could view arbitrary files on the system or execute arbitrary PHP local files with the privileges of the Web server.

* References:
http://www.claroline.net/forum/viewtopic.php?t=13533
http://www.claroline.net/wiki/index.php/Changelog_1.8.x
http://www.frsirt.com/english/advisories/2007/3045
http://secunia.com/advisories/26685

* Platforms Affected:
Claroline GPL Open Source Project, Claroline versions prior to 1.8.6
Any operating system Any version
Recommendation Upgrade to the latest version of Claroline (1.8.6 or later), available from the Claroline Download Web site at http://www.claroline.net/download.htm
Related URL CVE-2007-4718 (CVE)
Related URL 25521 (SecurityFocus)
Related URL 36421 (ISS)