Vulnerability Description
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chamilo | Chamilo | >= 1.11.0, <= 1.11.18 |
Related Weaknesses (CWE)
References
- http://chamilo.comProduct
- http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.ht
- https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20Issue TrackingVendor Advisory
- http://chamilo.comProduct
- http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.ht
- https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20Issue TrackingVendor Advisory
FAQ
What is CVE-2023-34960?
CVE-2023-34960 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
How severe is CVE-2023-34960?
CVE-2023-34960 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-34960?
Check the references section above for vendor advisories and patch information. Affected products include: Chamilo Chamilo.