CVE-2023-34960
CRITICAL EXPLOITED IN THE WILD NUCLEIChamilo unauthenticated command injection in PowerPoint upload
Title source: metasploitDescription
A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
Exploits (12)
nomisec
WORKING POC
1 stars
by Jenderal92 · remote
https://github.com/Jenderal92/CHAMILO-CVE-2023-34960
nomisec
WORKING POC
by tucommenceapousser · poc
https://github.com/tucommenceapousser/CVE-2023-34960-ex
metasploit
WORKING POC
EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/chamilo_unauth_rce_cve_2023_34960.rb
Nuclei Templates (1)
Chamilo Command Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
http.component:"Chamilo" || http.component:"chamilo" || cpe:"cpe:2.3:a:chamilo:chamilo"
References (3)
Scores
CVSS v3
9.8
EPSS
0.9399
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2023-07-16
InTheWild.io
2024-09-18
CWE
CWE-77
Status
published
Products (1)
chamilo/chamilo
1.11.0 - 1.11.18
Published
Aug 01, 2023
Tracked Since
Feb 18, 2026