René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

208 lines
7.6 KiB
JSON

{
"id": "CVE-2018-1999019",
"sourceIdentifier": "cve@mitre.org",
"published": "2018-07-23T15:29:00.707",
"lastModified": "2019-09-17T17:07:12.437",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Chamilo LMS version 11.x contains an Unserialization vulnerability in the \"hash\" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62."
},
{
"lang": "es",
"value": "Chamilo LMS en versiones 11.x contiene una vulnerabilidad de deserializaci\u00f3n en el par\u00e1metro GET \"hash\" para el endpoint de la API situado en /webservices/api/v2.php y que puede resultar en la ejecuci\u00f3n remota de c\u00f3digo no autenticado. El ataque parece sr explotable mediante una simple petici\u00f3n GET al endpoint API. La vulnerabilidad parece haber sido solucionada tras el commit con ID 0de84700648f098c1fbf6b807dee28ec640efe62."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "2079F7DE-E17F-4CAC-8EF9-B86AB0B0BDDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "7AD5F6B4-91D5-41B7-8BCA-32B5992BA121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "78473964-BCA3-4AFD-B0AF-1DF755C4FD0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "E9D5A82E-E47A-4500-AC96-959DCC12A13D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C475AC92-E499-447E-B712-5E7E40720930"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "6F0BF067-DCA1-4205-8C11-F9879E6BAF0A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "56EF9B04-B8E7-491D-B650-E77AF49A160A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "10CE9BBF-DF6A-4CBB-B805-D59365948D23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "D67503AF-CB0A-40F7-A9BF-958A737EA186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "152EB14A-257B-49A0-BC82-CBD178367A0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A3324481-48CB-4C31-881E-9487AB56DBC8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.4:-:*:*:*:*:*:*",
"matchCriteriaId": "3B86DA84-9383-4C0F-899F-DCAF458E3991"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.4:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "8B6FC534-76EB-49ED-97B6-7FD264A796C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.4:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "2CE77AF9-365F-4BCB-9AAF-1CED84AD51CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.4:beta1:*:*:*:*:*:*",
"matchCriteriaId": "01E34866-9154-4215-B698-FBA7071D93EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "85183AB2-581B-4DB4-BF9E-37F4AB8E9843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.6:-:*:*:*:*:*:*",
"matchCriteriaId": "BA648934-5B57-4446-B98D-34F409A649AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.6:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "B5C3BDED-A676-4773-A044-103AF19D17E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.8:-:*:*:*:*:*:*",
"matchCriteriaId": "BEA4A83D-D923-4A0C-B134-5C24EC68FD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:chamilo:chamilo_lms:1.11.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "56BBB7EA-7037-49FF-B17E-30A7D4B6F5BE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/chamilo/chamilo-lms/commit/0de84700648f098c1fbf6b807dee28ec640efe62",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://ibb.co/jBxe6y",
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}