Vulnerability Details : CVE-2023-3545
Potential exploit
Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo LMS <= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of `.htaccess` file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution.
Vulnerability category: Execute code
Products affected by CVE-2023-3545
- cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-3545
1.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-3545
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
STAR Labs SG Pte. Ltd. | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-3545
-
The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.Assigned by:
- info@starlabs.sg (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-3545
-
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-125-2023-07-13-Critical-impact-Moderate-risk-Htaccess-File-Upload-Security-Bypass-on-Windows-CVE-2023-3545
Security issues - Chamilo LMS - Chamilo Tracking SystemIssue Tracking;Vendor Advisory
-
https://starlabs.sg/advisories/23/23-3545/
(CVE-2023-3545) Chamilo LMS Htaccess File Upload Security Bypass | STAR LabsExploit;Third Party Advisory
-
https://github.com/chamilo/chamilo-lms/commit/dc7bfce429fbd843a95a57c184b6992c4d709549
Security: Rename htaccess file by replacing case-insensitively · chamilo/chamilo-lms@dc7bfce · GitHubPatch
Jump to