Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
References
Configurations
History
21 Nov 2024, 08:34
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | () https://github.com/chamilo/chamilo-lms/commit/3b487a55076fb06f96809b790a35dcdd42f8ec49 - Patch | |
References | () https://starlabs.sg/advisories/23/23-4220 - Exploit, Third Party Advisory | |
References | () https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-130-2023-09-04-Critical-impact-High-risk-Unauthenticated-users-may-gain-XSS-and-unauthenticated-RCE-CVE-2023-4220 - Issue Tracking, Vendor Advisory |
04 Dec 2023, 14:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Chamilo chamilo Lms
Chamilo |
|
CWE | CWE-79 CWE-434 |
|
References | () https://github.com/chamilo/chamilo-lms/commit/3b487a55076fb06f96809b790a35dcdd42f8ec49 - Patch | |
References | () https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-130-2023-09-04-Critical-impact-High-risk-Unauthenticated-users-may-gain-XSS-and-unauthenticated-RCE-CVE-2023-4220 - Issue Tracking, Vendor Advisory | |
References | () https://starlabs.sg/advisories/23/23-4220 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.1 |
28 Nov 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-28 08:15
Updated : 2024-11-21 08:34
NVD link : CVE-2023-4220
Mitre link : CVE-2023-4220
CVE.ORG link : CVE-2023-4220
JSON object : View
Products Affected
chamilo
- chamilo_lms