Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

HTTP:PHP:CLAROLINE-INCLUDE

Severity

High

Recommended

No

Category

HTTP

Keywords

Claroline Import.lib.PHP Remote File Inclusion

Release Date

2007/01/17

Update Number

1213

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP: Claroline Import.lib.PHP Remote File Inclusion


This signature detects attempts to exploit a known vulnerability against Claroline. A successful attack can lead to arbitrary code execution.

Extended Description

Claroline is prone to a remote file-include vulnerability because it fails to sufficiently sanitize user-supplied input data. An attacker can exploit this issue to have malicious PHP code execute in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible. Version 1.8.0 rc1 is affected by this issue; other versions may also be affected.

Affected Products

  • Claroline 1.8.0 rc1

References

  • BugTraq: 20444
  • CVE: CVE-2006-5256
  • URL: http://www.frsirt.com/english/advisories/2006/3996
  • URL: http://www.milw0rm.com/exploits/2510

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out