First published: Sun Jun 30 2019(Updated: )
Chamilo LMS 1.11.8 and 2.x allows remote code execution through an lp_upload.php unauthenticated file upload feature. It extracts a ZIP archive before checking its content, and once it has been extracted, does not check files in a recursive way. This means that by putting a .php file in a folder and then this folder in a ZIP archive, the server will accept this file without any checks. Because one can access this file from the website, it is remote code execution. This is related to a scorm imsmanifest.xml file, the import_package function, and extraction in $courseSysDir.$newDir.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Chamilo Chamilo Lms | =1.11.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13082 refers to a vulnerability in Chamilo LMS 1.11.8 and 2.x that allows remote code execution through an unauthenticated file upload feature.
This vulnerability can be exploited by uploading a malicious PHP file through the lp_upload.php feature and then executing arbitrary code on the server.
CVE-2019-13082 has a severity rating of critical with a CVSS score of 9.8.
Yes, a fix is available for CVE-2019-13082. It is recommended to update to a version of Chamilo LMS that is not affected by this vulnerability.
More information about CVE-2019-13082 can be found at the following references: [https://0xecute.com/?p=32](https://0xecute.com/?p=32) and [https://support.chamilo.org/projects/1/wiki/Security_issues](https://support.chamilo.org/projects/1/wiki/Security_issues).