Vulnerability Description
Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chamilo | Chamilo Lms | 1.11.0 |
Related Weaknesses (CWE)
References
- https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec64PatchThird Party Advisory
- https://ibb.co/jBxe6yMailing ListThird Party Advisory
- https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec64PatchThird Party Advisory
- https://ibb.co/jBxe6yMailing ListThird Party Advisory
FAQ
What is CVE-2018-1999019?
CVE-2018-1999019 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code ex...
How severe is CVE-2018-1999019?
CVE-2018-1999019 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-1999019?
Check the references section above for vendor advisories and patch information. Affected products include: Chamilo Chamilo Lms.