Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-1999019

Опубликовано: 23 июл. 2018
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:chamilo:chamilo_lms:1.11.0:-:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta3:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta4:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta5:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta6:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:beta7:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.0:rc1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.2:*:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.4:-:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.4:alpha1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.4:alpha2:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.4:beta1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.4:rc1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.6:-:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.6:alpha1:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.8:-:*:*:*:*:*:*
cpe:2.3:a:chamilo:chamilo_lms:1.11.8:rc1:*:*:*:*:*:*

EPSS

Процентиль: 82%
0.01684
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-94

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.

EPSS

Процентиль: 82%
0.01684
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-94