Lucene search

K
cve[email protected]CVE-2023-3545
HistoryNov 28, 2023 - 7:15 a.m.

CVE-2023-3545

2023-11-2807:15:42
CWE-178
web.nvd.nist.gov
19
cve-2023-3545
chamilo lms
file upload
remote code execution
unauthenticated attackers
security vulnerability

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.1%

Improper sanitisation in main/inc/lib/fileUpload.lib.php in Chamilo LMS <= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of .htaccess file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution.

Affected configurations

NVD
Node
chamilochamiloRange1.11.20
CPENameOperatorVersion
chamilo:chamilochamilole1.11.20

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows"
    ],
    "product": "Chamilo",
    "repo": "https://github.com/chamilo/chamilo-lms/",
    "vendor": "Chamilo",
    "versions": [
      {
        "lessThanOrEqual": "1.11.20",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.9 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

75.1%

Related for CVE-2023-3545