Claroline Software Detection

2006-09-18T00:00:00
ID CLAROLINE_DETECT.NASL
Type nessus
Reporter Tenable
Modified 2015-10-13T00:00:00

Description

The remote host is running Claroline, an open source, web-based, collaborative learning environment written in PHP.

                                        
                                            #
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description) {
  script_id(22409);
  script_version("$Revision: 1.14 $");

  script_name(english:"Claroline Software Detection");
  script_summary(english:"Checks for presence of Claroline");
 
 script_set_attribute(attribute:"synopsis", value:
"The remote web server contains an open source e-learning application
written in PHP." );
 script_set_attribute(attribute:"description", value:
"The remote host is running Claroline, an open source, web-based,
collaborative learning environment written in PHP." );
 script_set_attribute(attribute:"see_also", value:"http://www.claroline.net/" );
 script_set_attribute(attribute:"risk_factor", value:"None" );
 script_set_attribute(attribute:"solution", value:"n/a" );
 script_set_attribute(attribute:"plugin_publication_date", value: "2006/09/18");
 script_cvs_date("$Date: 2015/10/13 15:19:32 $");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value: "cpe:/a:claroline:claroline");
script_end_attributes();

 
  script_copyright(english:"This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.");

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");
 
  script_dependencies("http_version.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);
  script_require_keys("www/PHP");
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80, embedded: 0, php: 1);


# Loop through directories.
if (thorough_tests) dirs = list_uniq(make_list("/claroline", cgi_dirs()));
else dirs = make_list(cgi_dirs());

installs = 0;
foreach dir (dirs) {
  res = http_get_cache(item:string(dir, "/index.php"), port:port, exit_on_fail: 1);

  # If it looks like Claroline...
  if (
    '<link href="http://www.claroline.net" rel="Copyright" />' >< res ||
    ' class="claroRightMenu"' >< res ||
    ' class="claroToolTitle"' >< res
  ) {
    # Try to get the version number from the README.txt.
    r = http_send_recv3(method:"GET", item:string(dir, "/README.txt"), port:port, exit_on_fail: 1);
    res = r[2];

    pat = "^ +CLAROLINE +(.+) +- +README";
    matches = egrep(pattern:pat, string:res);
    if (matches) {
      foreach match (split(matches)) {
        match = chomp(match);
        ver = eregmatch(pattern:pat, string:match);
        if (!isnull(ver)) {
          ver = ver[1];
          break;
        }
      }
    }

    # Oh well, just mark it as "unknown".
    if (isnull(ver)) ver = "unknown";

    if (dir == "") dir = "/";

    set_kb_item(
      name:string("www/", port, "/claroline"),
      value:string(ver, " under ", dir)
    );
    set_kb_item(name:"www/claroline", value: TRUE);
    installations[dir] = ver;
    ++installs;

    # Scan for multiple installations only if the "Perform thorough tests" setting is checked.
    if (!thorough_tests) break;
  }
}


# Report any instances found unless Report verbosity is "Quiet".
if (installs && report_verbosity > 0) {
  if (installs == 1) {
    foreach dir (keys(installations)) {
      # empty - just need to set 'dir'.
    }
    if (ver == "unknown") {
      info = string("An unknown version of Claroline was detected on the remote host\nunder the path '", dir, "'.");
    }
    else {
      info = string("Claroline ", ver, " was detected on the remote host under the path\n'", dir, "'.");
    }
  }
  else {
    info = string(
      "Multiple instances of Claroline were detected on the remote host:\n",
      "\n"
    );
    foreach dir (keys(installations)) {
      info = info + string("    ", installations[dir], ", installed under ", dir, "\n");
    }
    info = chomp(info);
  }

  security_note(port:port, extra:'\n'+info);
}