.. / CVE-2023-3368

Exploit for Chamilo LMS <= v1.11.20 Unauthenticated Command Injection (CVE-2023-3368)

Description:

Command injection in /main/webservices/additional_webservices.php in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters.

Nuclei Template

View the template here CVE-2023-3368.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2023/CVE-2023-3368.yaml
Copy

References:

https://https://github.com/chamilo/chamilo-lms/commit/4c69b294f927db62092e01b70ac9bd6e32d5b48b
https://nvd.nist.gov/vuln/detail/CVE-2023-3368
https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b21d657a
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-121-2023-07-05-Critical-impact-High-risk-Unauthenticated-Command-Injection-CVE-2023-3368
https://starlabs.sg/advisories/23/23-3368/