A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
References
Configurations
History
04 Aug 2023, 16:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) http://chamilo.com - Product | |
References | (MISC) https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution - Issue Tracking, Vendor Advisory | |
CWE | CWE-77 |
01 Aug 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-01 02:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-34960
Mitre link : CVE-2023-34960
CVE.ORG link : CVE-2023-34960
JSON object : View
Products Affected
chamilo
- chamilo
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')