mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
36 lines
1.6 KiB
Markdown
36 lines
1.6 KiB
Markdown
![]() |
### [CVE-2023-34960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34960)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Aituglo/CVE-2023-34960
|
||
|
- https://github.com/Jenderal92/CHAMILO-CVE-2023-34960
|
||
|
- https://github.com/Mantodkaz/CVE-2023-34960
|
||
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
||
|
- https://github.com/MzzdToT/Chamilo__CVE-2023-34960_RCE
|
||
|
- https://github.com/MzzdToT/HAC_Bored_Writing
|
||
|
- https://github.com/Pari-Malam/CVE-2023-34960
|
||
|
- https://github.com/ThatNotEasy/CVE-2023-34960
|
||
|
- https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP
|
||
|
- https://github.com/getdrive/PoC
|
||
|
- https://github.com/h00die-gr3y/Metasploit
|
||
|
- https://github.com/hheeyywweellccoommee/Chamilo__CVE-2023-34960_RCE-ouvuu
|
||
|
- https://github.com/iluaster/getdrive_PoC
|
||
|
- https://github.com/izj007/wechat
|
||
|
- https://github.com/laohuan12138/exp-collect
|
||
|
- https://github.com/lions2012/Penetration_Testing_POC
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/tucommenceapousser/CVE-2023-34960-ex
|
||
|
|