Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
References
Link | Resource |
---|---|
https://ibb.co/jBxe6y | Mailing List Third Party Advisory |
https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-07-23 08:29
Updated : 2019-09-17 10:07
NVD link : CVE-2018-1999019
Mitre link : CVE-2018-1999019
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
chamilo
- chamilo_lms