Claroline document.php Multiple Variable Traversal Arbitrary File/Directory Manipulation

2005-04-27T08:26:58
ID OSVDB:16537
Type osvdb
Reporter Sieg Fried(Siegfried@zone-h.org)
Modified 2005-04-27T08:26:58

Description

Vulnerability Description

Claroline contains a flaw that allows a remote attacker to upload or manipulate files or directories outside of the web path. The issue is due to the document.php not properly sanitizing user input, specifically traversal style attacks (../../).

Solution Description

Upgrade to version 1.5.4, 1.6 final or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Claroline contains a flaw that allows a remote attacker to upload or manipulate files or directories outside of the web path. The issue is due to the document.php not properly sanitizing user input, specifically traversal style attacks (../../).

References:

Vendor URL: http://www.claroline.net/ Vendor Specific Advisory URL Security Tracker: 1013822 Secunia Advisory ID:15161 Related OSVDB ID: 16520 Related OSVDB ID: 16538 Related OSVDB ID: 16539 Related OSVDB ID: 16530 Other Advisory URL: http://www.zone-h.org/advisories/read/id=7472 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-04/0467.html Keyword: Zone-H Research Center Security Advisory 200501 ISS X-Force ID: 20287 CVE-2005-1376 Bugtraq ID: 13407