Path traversal in file upload functionality in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via arbitrary file write.
References
Link | Resource |
---|---|
https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b21d657a | Patch |
https://starlabs.sg/advisories/23/23-3533/ | Exploit Third Party Advisory |
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-124-2023-07-13-Critical-impact-High-risk-Unauthenticated-Arbitrary-File-Write-RCE-CVE-2023-3533 | Issue Tracking Patch Vendor Advisory |
https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b21d657a | Patch |
https://starlabs.sg/advisories/23/23-3533/ | Exploit Third Party Advisory |
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-124-2023-07-13-Critical-impact-High-risk-Unauthenticated-Arbitrary-File-Write-RCE-CVE-2023-3533 | Issue Tracking Patch Vendor Advisory |
Configurations
History
No history.
Information
Published : 2023-11-28 07:15
Updated : 2024-11-21 08:17
NVD link : CVE-2023-3533
Mitre link : CVE-2023-3533
CVE.ORG link : CVE-2023-3533
JSON object : View
Products Affected
chamilo
- chamilo
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')