Lucene search

K
cveSTAR_LabsCVE-2023-3368
HistoryNov 28, 2023 - 7:15 a.m.

CVE-2023-3368

2023-11-2807:15:41
CWE-78
STAR_Labs
web.nvd.nist.gov
143
cve-2023-3368
chamilo lms
command injection
remote code execution
security vulnerability

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.942

Percentile

99.2%

Command injection in /main/webservices/additional_webservices.php in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960.

Affected configurations

Nvd
Node
chamilochamiloRange<1.11.20
VendorProductVersionCPE
chamilochamilo*cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Chamilo",
    "repo": "https://github.com/chamilo/chamilo-lms/",
    "vendor": "Chamilo",
    "versions": [
      {
        "lessThanOrEqual": "1.11.20",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.942

Percentile

99.2%