LibLime Koha 'KohaOpacLanguage' Parameter Local File Inclusion Vulnerability

Summary
The host is running LibLime Koha and is prone to local file inclusion vulnerability.
Impact
Successful exploitation will allow remote attackers to obtain potentially sensitive information and execute arbitrary local scripts in the context of the Web server process. Impact Level: Application
Solution
Upgrade to version 4.5 Build 4500 or higher, For updates refer to http://www.koha.org
Insight
The flaw is due to the cgi-bin/opac/opac-main.pl script not properly sanitizing user input supplied to the cgi-bin/koha/mainpage.pl script via the 'KohaOpacLanguage' cookie. This can be exploited to include arbitrary files from local resources via directory traversal attacks and URL-encoded NULL bytes.
Affected
LibLime Koha versions 4.02.06 and prior.
References