Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
References
Link | Resource |
---|---|
https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 | Patch Third Party Advisory |
https://ibb.co/jBxe6y | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-07-23 15:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-1999019
Mitre link : CVE-2018-1999019
CVE.ORG link : CVE-2018-1999019
JSON object : View
Products Affected
chamilo
- chamilo_lms
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')