VID |
21981 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The Dokeos is vulnerable to multiple remote file include vulnerabilities which exist in versions prior to 1.6.4 or 2.0.3. Dokeos is a learning management system. Dokeos versions 1.6.3 and earlier and Dokeos Community Release 2.0.2 and earlier are vulnerable to multiple remote file include vulnerabilities, caused by improper validation of user-supplied input passed to the 'rootSys' parameter in the 'claroline/exercice/testheaderpage.php' script and the 'clarolineRepositorySys' parameter in the 'claroline/resourcelinker/resourcelinker.inc.php' script. If PHP's 'register_globals' setting is enabled, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.
* References: http://www.dokeos.com/forum/viewtopic.php?t=6848 http://www.dokeos.com/wiki/index.php/Security#April_5th.2C_2006 http://www.frsirt.com/english/advisories/2006/1303 http://secunia.com/advisories/19576/
* Platforms Affected: Dokeos version 1.6.3 and earlier versions Dokeos version 2.0.2 and earlier versions Any operating system Any versions |
Recommendation |
Upgrade to the latest version of Dokeos (1.6.4 or later) or Dokeos Community Release (2.0.3 or later) available from the Dokeos Learning Management System Web site at http://www.dokeos.com/download.php |
Related URL |
CVE-2006-2286 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
25740 (ISS) |
|