| VID |
210075 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Claroline software is vulnerable to a local file include vulnerability via the 'language' parameter. Claroline is an Open Source software based on PHP/MySQL. It's a collaborative learning environment allowing teachers or education institutions to create and administer courses through the Web. Claroline versions prior to 1.8.6 are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input to the 'language' parameter in the 'claroline/inc/lib/language.lib.php' script. Regardless of PHP's 'register_globals' setting, by sending a specially-crafted request to the index.php script containing "dot dot" sequences (/../) in the language parameter, a remote attacker could view arbitrary files on the system or execute arbitrary PHP local files with the privileges of the Web server.
* References: http://www.claroline.net/forum/viewtopic.php?t=13533 http://www.claroline.net/wiki/index.php/Changelog_1.8.x http://www.frsirt.com/english/advisories/2007/3045 http://secunia.com/advisories/26685
* Platforms Affected: Claroline GPL Open Source Project, Claroline versions prior to 1.8.6 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Claroline (1.8.6 or later), available from the Claroline Download Web site at http://www.claroline.net/download.htm |
| Related URL |
CVE-2007-4718 (CVE) |
| Related URL |
25521 (SecurityFocus) |
| Related URL |
36421 (ISS) |
|