Overview
- Description
- Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
- Source
- info@starlabs.sg
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.1
- Impact score
- 2.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
Social media
- Hype score
- Not currently trending
PermX is an easy @hackthebox_eu machine. Dealing with subdomain enumeration to discover a Chamilo LMS vulnerable to CVE-2023-4220. Then some data exfil to abuse a bash script with sudo privs to symlink the root dir and modify the shadow file to gain root https://t.co/74A3KLcLTE
@_kujen5
3 Nov 2024
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220. The system is vulnerable in versions preceding 1.11.24. https://t.co/Q8QbX0Ar37
@mr_kaito_2019
21 Oct 2024
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2023-4220 #bugbounty #bugbountytip #cve Exploit: https://t.co/zUTWmKsrVF https://t.co/kYLV8Wpvze
@zapstiko
21 Oct 2024
6779 Impressions
15 Retweets
100 Likes
50 Bookmarks
1 Reply
1 Quote
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CA5310C-E5B0-4369-BC5A-F56EBED72EBA", "versionEndIncluding": "1.11.24" } ], "operator": "OR" } ] } ]