First published: Tue Nov 28 2023(Updated: )
Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo LMS <= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of `.htaccess` file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution.
Credit: info@starlabs.sg
Affected Software | Affected Version | How to fix |
---|---|---|
Chamilo Chamilo | <=1.11.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3545 refers to a vulnerability in Chamilo LMS that allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of .htaccess file.
CVE-2023-3545 affects Chamilo LMS version 1.11.20 on Windows and Apache installations.
CVE-2023-3545 has a severity rating of critical with a CVSS score of 9.8.
An attacker can exploit CVE-2023-3545 by uploading a .htaccess file to bypass file upload security protections and execute remote code.
Yes, a fix for CVE-2023-3545 is available. It is recommended to update to a version of Chamilo LMS that is not affected by this vulnerability.