Total
42 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2023-31800 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | N/A | 5.4 MEDIUM |
Cross Site Scripting vulnerability found in Chamilo Lms v.1.11.18 allows a local attacker to execute arbitrary code via the forum title parameter. | |||||
CVE-2022-27421 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 6.5 MEDIUM | 7.2 HIGH |
Chamilo LMS v1.11.13 lacks validation on the user modification form, allowing attackers to escalate privileges to Platform Admin. | |||||
CVE-2022-27423 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Chamilo LMS v1.11.13 was discovered to contain a SQL injection vulnerability via the blog_id parameter at /blog/blog.php. | |||||
CVE-2022-27426 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 6.5 MEDIUM | 8.8 HIGH |
A Server-Side Request Forgery (SSRF) in Chamilo LMS v1.11.13 allows attackers to enumerate the internal network and execute arbitrary system commands via a crafted Phar file. | |||||
CVE-2022-27422 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A reflected cross-site scripting (XSS) vulnerability in Chamilo LMS v1.11.13 allows attackers to execute arbitrary web scripts or HTML via user interaction with a crafted URL. | |||||
CVE-2021-35415 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 3.5 LOW | 4.8 MEDIUM |
A stored cross-site scripting (XSS) vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the course "Title" and "Content" fields. | |||||
CVE-2020-23126 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
Chamilo LMS version 1.11.10 contains an XSS vulnerability in the personal profile edition form, affecting the user him/herself and social network friends. | |||||
CVE-2021-35414 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Chamilo LMS v1.11.x was discovered to contain a SQL injection via the doc parameter in main/plagiarism/compilatio/upload.php. | |||||
CVE-2021-35413 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 6.0 MEDIUM | 8.8 HIGH |
A remote code execution (RCE) vulnerability in course_intro_pdf_import.php of Chamilo LMS v1.11.x allows authenticated attackers to execute arbitrary code via a crafted .htaccess file. | |||||
CVE-2020-23128 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 4.0 MEDIUM | 4.9 MEDIUM |
Chamilo LMS 1.11.10 does not properly manage privileges which could allow a user with Sessions administrator privilege to create a new user then use the edit user function to change this new user to administrator privilege. | |||||
CVE-2021-37390 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 4.3 MEDIUM | 6.1 MEDIUM |
A Chamilo LMS 1.11.14 reflected XSS vulnerability exists in main/social/search.php=q URI (social network search feature). | |||||
CVE-2020-23127 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 6.8 MEDIUM | 8.8 HIGH |
Chamilo LMS 1.11.10 is affected by Cross Site Request Forgery (CSRF) via the edit_user function by targeting an admin user. | |||||
CVE-2021-37391 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
A user without privileges in Chamilo LMS 1.11.14 can send an invitation message to another user, e.g., the administrator, through main/social/search.php, main/inc/lib/social.lib.php and steal cookies or execute arbitrary code on the administration side via a stored XSS vulnerability via social network the send invitation feature. | |||||
CVE-2015-9540 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 5.8 MEDIUM | 6.1 MEDIUM |
Chamilo LMS through 1.9.10.2 allows a link_goto.php?link_url= open redirect, a related issue to CVE-2015-5503. | |||||
CVE-2012-4030 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 6.4 MEDIUM | 7.5 HIGH |
Chamilo before 1.8.8.6 does not adequately handle user supplied input by the index.php script, which could allow remote attackers to delete arbitrary files. | |||||
CVE-2019-13082 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Chamilo LMS 1.11.8 and 2.x allows remote code execution through an lp_upload.php unauthenticated file upload feature. It extracts a ZIP archive before checking its content, and once it has been extracted, does not check files in a recursive way. This means that by putting a .php file in a folder and then this folder in a ZIP archive, the server will accept this file without any checks. Because one can access this file from the website, it is remote code execution. This is related to a scorm imsmanifest.xml file, the import_package function, and extraction in $courseSysDir.$newDir. | |||||
CVE-2018-20327 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
Chamilo LMS version 1.11.8 contains XSS in main/template/default/admin/gradebook_list.tpl in the gradebook dependencies tool, allowing authenticated users to affect other users, under specific conditions of permissions granted by administrators. This is considered "low risk" due to the nature of the feature it exploits. | |||||
CVE-2018-1999019 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 7.5 HIGH | 9.8 CRITICAL |
Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62. | |||||
CVE-2018-20328 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 3.5 LOW | 5.4 MEDIUM |
Chamilo LMS version 1.11.8 contains XSS in main/social/group_view.php in the social groups tool, allowing authenticated users to affect other users, under specific conditions of permissions granted by administrators. This is considered "low risk" due to the nature of the feature it exploits. | |||||
CVE-2019-1000017 | 1 Chamilo | 1 Chamilo Lms | 2024-02-04 | 4.0 MEDIUM | 6.5 MEDIUM |
Chamilo Chamilo-lms version 1.11.8 and earlier contains an Incorrect Access Control vulnerability in Tickets component that can result in an authenticated user can read all tickets available on the platform, due to lack of access controls. This attack appears to be exploitable via ticket_id=[ticket number]. This vulnerability appears to have been fixed in 1.11.x after commit 33e2692a37b5b6340cf5bec1a84e541460983c03. |