Description
SQL injection vulnerability in the check_user_password function in main/auth/profile.php in Chamilo LMS 1.9.6 and earlier, when using the non-encrypted passwords mode set at installation, allows remote authenticated users to execute arbitrary SQL commands via the "password0" parameter.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/30012
References (4)
Core 4
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/30012
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2013-11/0141.html
Exploit x_refsource_misc
https://www.htbridge.com/advisory/HTB23182
Scores
EPSS
0.0059
EPSS Percentile
69.3%
Details
CWE
CWE-89
Status
published
Products (10)
chamilo/chamilo_lms
1.8.6.2
chamilo/chamilo_lms
1.8.7
chamilo/chamilo_lms
1.8.7.1
chamilo/chamilo_lms
1.8.8.2
chamilo/chamilo_lms
1.8.8.4
chamilo/chamilo_lms
1.8.8.6
chamilo/chamilo_lms
1.9.0
chamilo/chamilo_lms
1.9.2
chamilo/chamilo_lms
1.9.4
chamilo/chamilo_lms
< 1.9.6
Published
Dec 05, 2013
Tracked Since
Feb 18, 2026