cve/2023/CVE-2023-3545.md

18 lines
988 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3545](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3545)
![](https://img.shields.io/static/v1?label=Product&message=Chamilo&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%3D%201.11.20%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-178%20Improper%20Handling%20of%20Case%20Sensitivity&color=brighgreen)
### Description
Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo LMS <= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of `.htaccess` file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution.
### POC
#### Reference
- https://starlabs.sg/advisories/23/23-3545/
#### Github
No PoCs found on GitHub currently.