CVE-2023-34960

CRITICAL EXPLOITED IN THE WILD NUCLEI

Chamilo unauthenticated command injection in PowerPoint upload

Title source: metasploit

Description

A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.

Exploits (12)

nomisec WORKING POC 34 stars
by Aituglo · remote
https://github.com/Aituglo/CVE-2023-34960
nomisec WORKING POC 22 stars
by ThatNotEasy · remote
https://github.com/ThatNotEasy/CVE-2023-34960
nomisec WORKING POC 4 stars
by Mantodkaz · remote
https://github.com/Mantodkaz/CVE-2023-34960
nomisec WORKING POC 1 stars
by Jenderal92 · remote
https://github.com/Jenderal92/CHAMILO-CVE-2023-34960
gitlab WORKING POC
by aituglo · poc
https://gitlab.com/aituglo/CVE-2023-34960
gitlab WORKING POC
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/CVE-2023-34960
gitlab WORKING POC
by mdelaclaire · poc
https://gitlab.com/mdelaclaire/CVE-2023-34960-ex
nomisec WRITEUP
by tpdlshdmlrkfmcla · poc
https://github.com/tpdlshdmlrkfmcla/cve-2023-34960
nomisec WORKING POC
by tucommenceapousser · poc
https://github.com/tucommenceapousser/CVE-2023-34960-ex
nomisec WORKING POC
by YongYe-Security · poc
https://github.com/YongYe-Security/CVE-2023-34960
vulncheck_xdb WORKING POC
dos
https://github.com/YongYe-Security/Chamilo_CVE-2023-34960-EXP
metasploit WORKING POC EXCELLENT
rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/chamilo_unauth_rce_cve_2023_34960.rb

Nuclei Templates (1)

Chamilo Command Injection
CRITICALVERIFIEDby DhiyaneshDK
Shodan: http.component:"Chamilo" || http.component:"chamilo" || cpe:"cpe:2.3:a:chamilo:chamilo"

Scores

CVSS v3 9.8
EPSS 0.9399
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

VulnCheck KEV 2023-07-16
InTheWild.io 2024-09-18
CWE
CWE-77
Status published
Products (1)
chamilo/chamilo 1.11.0 - 1.11.18
Published Aug 01, 2023
Tracked Since Feb 18, 2026