Vulnerability Description
Path traversal in file upload functionality in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via arbitrary file write.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Chamilo | Chamilo | <= 1.11.20 |
Related Weaknesses (CWE)
References
- https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b2Patch
- https://starlabs.sg/advisories/23/23-3533/ExploitThird Party Advisory
- https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-124-2Issue TrackingPatchVendor Advisory
- https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b2Patch
- https://starlabs.sg/advisories/23/23-3533/ExploitThird Party Advisory
- https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-124-2Issue TrackingPatchVendor Advisory
FAQ
What is CVE-2023-3533?
CVE-2023-3533 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Path traversal in file upload functionality in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to perform stored cross-site scripting attacks...
How severe is CVE-2023-3533?
CVE-2023-3533 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-3533?
Check the references section above for vendor advisories and patch information. Affected products include: Chamilo Chamilo.