A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
References
Configurations
History
21 Nov 2024, 08:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://chamilo.com - Product | |
References | () http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html - | |
References | () https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution - Issue Tracking, Vendor Advisory |
Information
Published : 2023-08-01 02:15
Updated : 2024-11-21 08:07
NVD link : CVE-2023-34960
Mitre link : CVE-2023-34960
CVE.ORG link : CVE-2023-34960
JSON object : View
Products Affected
chamilo
- chamilo
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')