Description
Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
Remediation
References
Related Vulnerabilities
WordPress Plugin FireStats 'firestats-wordpress.php' Remote File Include (1.6.1)
Liferay Portal Incorrect Default Permissions Vulnerability (CVE-2022-42130)
Oracle JRE CVE-2023-21930 Vulnerability (CVE-2023-21930)
WordPress Plugin Admin Management Xtended Privilege Escalation (2.4.0)
Atlassian Jira URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2019-20901)