vendor:
Dokeos, Chamilo
by:
beford
7.5
CVSS
HIGH
Remote File Disclosure
22
CWE
Product Name: Dokeos, Chamilo
Affected Version From: Dokeos 1.8.6.1 / 2.0, Chamilo 1.8.7.1
Affected Version To: Dokeos 1.8.6.1 / 2.0, Chamilo 1.8.7.1
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2011
Chamilo 1.8.7 / Dokeos 1.8.6 Remote File Disclosure
Two file disclosure flaws exists on these LMS platforms, which could allow an attacker registered on the system to obtain files from the server, i.e your database configuration file, or any other file readeable by the webserver. The user input to the $_GET['file'] variable was not been cleaned at all, and used to open a file and send it to the browser of the user, it only required to be registered and subscribed to a course. The user input on $_GET['doc_url'] was been checked for transversal path injection attempts, however the filter is wrongly implemented, and can be bypassed. Also other functions that should prevent this behavior were not working properly.
Mitigation:
Vendor response Dokeos: none Vendor response Chamilo: Patches developed and new version expected around Feb 15, 2011