cve/2023/CVE-2023-34960.md

39 lines
1.7 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-34960](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34960)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
### POC
#### Reference
- http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Aituglo/CVE-2023-34960
- https://github.com/Jenderal92/CHAMILO-CVE-2023-34960
- https://github.com/Mantodkaz/CVE-2023-34960
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/MzzdToT/Chamilo__CVE-2023-34960_RCE
- https://github.com/MzzdToT/HAC_Bored_Writing
- https://github.com/Pari-Malam/CVE-2023-34960
- https://github.com/ThatNotEasy/CVE-2023-34960
2024-05-28 08:49:17 +00:00
- https://github.com/YongYe-Security/CVE-2023-34960
2024-05-25 21:48:12 +02:00
- https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP
- https://github.com/getdrive/PoC
- https://github.com/h00die-gr3y/Metasploit
- https://github.com/hheeyywweellccoommee/Chamilo__CVE-2023-34960_RCE-ouvuu
- https://github.com/iluaster/getdrive_PoC
- https://github.com/izj007/wechat
- https://github.com/laohuan12138/exp-collect
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/nomi-sec/PoC-in-GitHub
2024-06-07 04:52:01 +00:00
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
2024-05-25 21:48:12 +02:00
- https://github.com/tucommenceapousser/CVE-2023-34960-ex
2024-05-28 08:49:17 +00:00
- https://github.com/whoami13apt/files2
2024-05-25 21:48:12 +02:00