CVE-2023-34960

A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
Configurations

Configuration 1 (hide)

cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*

History

24 Aug 2023, 17:15

Type Values Removed Values Added
References
  • (MISC) http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html -

04 Aug 2023, 16:05

Type Values Removed Values Added
CPE cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*
References (MISC) https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution - (MISC) https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution - Issue Tracking, Vendor Advisory
References (MISC) http://chamilo.com - (MISC) http://chamilo.com - Product
First Time Chamilo
Chamilo chamilo
CWE CWE-77
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

01 Aug 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-08-01 02:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-34960

Mitre link : CVE-2023-34960

CVE.ORG link : CVE-2023-34960


JSON object : View

Products Affected

chamilo

  • chamilo
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')