Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
References
Link | Resource |
---|---|
https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62 | Patch Third Party Advisory |
https://ibb.co/jBxe6y | Mailing List Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:22:22
Updated: 2022-10-03T16:22:22
Reserved: 2018-07-17T00:00:00
Link: CVE-2018-1999019
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-07-23T15:29:00.707
Modified: 2019-09-17T17:07:12.437
Link: CVE-2018-1999019
JSON object: View
Redhat Information
No data.
CWE