Korean
<< Back
VID 21982
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Dokeos program is vulnerable to a remote file include vulnerability via the 'extAuthSource' parameter. Dokeos is a learning management system. Dokeos versions 1.6.5 and earlier and Dokeos Community Release versions 2.x are vulnerable to a remote file include vulnerability, caused by improper validation of user-supplied input passed to the 'extAuthSource[newUser]' parameter of the 'claro_init_local.inc.php' script. If PHP's 'register_globals' setting is enabled, a remote attacker could send a specially-crafted URL request to execute arbitrary PHP code and operating system commands on the affected host.

* References:
http://www.gulftech.org/?node=research&article_id=00112-09142006
http://www.frsirt.com/english/advisories/2006/3638
http://www.frsirt.com/english/advisories/2006/3639
http://secunia.com/advisories/21931
http://secunia.com/advisories/21948

* Platforms Affected:
Dokeos version 1.6.5 and earlier versions
Dokeos Community Release versions 2.x
Any operating system Any version
Recommendation No upgrade or patch available as of Sep 2006.

Upgrade to the latest version of Dokeos, when new version fixed this problem becomes available from the Dokeos Learning Management System Web site at http://www.dokeos.com/download.php

As a workaround, disable PHP's 'register_globals' setting.
Related URL CVE-2006-4844 (CVE)
Related URL 20056 (SecurityFocus)
Related URL 28943 (ISS)