Secunia Security Advisory - karmaguedon has reported a vulnerability in Claroline, which potentially can be exploited by malicious people to bypass certain security restrictions.
278db1c035c263888bc6629b7ac4d5ee29b957f12dec95d964f85c464331cef5
TITLE:
Claroline Single Sign-On System Predictable Cookie
SECUNIA ADVISORY ID:
SA18588
VERIFY ADVISORY:
http://secunia.com/advisories/18588/
CRITICAL:
Less critical
IMPACT:
Hijacking, Security Bypass
WHERE:
>From remote
SOFTWARE:
Claroline 1.x
http://secunia.com/product/4607/
DESCRIPTION:
karmaguedon has reported a vulnerability in Claroline, which
potentially can be exploited by malicious people to bypass certain
security restrictions.
The vulnerability is caused due to the "claro_init_local.inc.php"
script generating a predictable value based on the current time for
the authentication cookie used by the internal SSO (Single Sign-On)
system. This may be exploited to gain access to an application using
Claroline's internal SSO system.
Successful exploitation requires that the SSO functionality is
enabled (not enabled by default).
The vulnerability has been reported in version 1.7.2. Other versions
may also be affected.
SOLUTION:
Disable the SSO functionality.
The vulnerability will reportedly be fixed in a patch soon.
PROVIDED AND/OR DISCOVERED BY:
karmaguedon
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------