Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
References
Link | Resource |
---|---|
https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 | Patch Third Party Advisory |
https://ibb.co/jBxe6y | Mailing List Third Party Advisory |
https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 | Patch Third Party Advisory |
https://ibb.co/jBxe6y | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:57
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 - Patch, Third Party Advisory | |
References | () https://ibb.co/jBxe6y - Mailing List, Third Party Advisory |
Information
Published : 2018-07-23 15:29
Updated : 2024-11-21 03:57
NVD link : CVE-2018-1999019
Mitre link : CVE-2018-1999019
CVE.ORG link : CVE-2018-1999019
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')