← Retour aux CVEs
CVE-2019-13082
N/ADescription
Chamilo LMS 1.11.8 and 2.x allows remote code execution through an lp_upload.php unauthenticated file upload feature. It extracts a ZIP archive before checking its content, and once it has been extracted, does not check files in a recursive way. This means that by putting a .php file in a folder and then this folder in a ZIP archive, the server will accept this file without any checks. Because one can access this file from the website, it is remote code execution. This is related to a scorm imsmanifest.xml file, the import_package function, and extraction in $courseSysDir.$newDir.
Details CVE
Score CVSS v3.1N/A
Publie6/30/2019
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
chamilo:chamilo_lms
Faiblesses (CWE)
CWE-434
References
https://0xecute.com/?p=32(cve@mitre.org)
https://support.chamilo.org/projects/1/wiki/Security_issues(cve@mitre.org)
https://0xecute.com/?p=32(af854a3a-2127-422b-91ae-364da2661108)
https://support.chamilo.org/projects/1/wiki/Security_issues(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.