exploitdb
WORKING POC
by Mohamed Kamel BOUZEKRIA · pythonwebappsphp
https://www.exploit-db.com/exploits/52083
This exploit leverages an unrestricted file upload vulnerability in Chamilo LMS 1.11.24 to achieve unauthenticated remote code execution by uploading a PHP web shell and executing arbitrary commands via HTTP requests.
Classification
Working Poc 95%
Target:
Chamilo LMS 1.11.24
No auth needed
Prerequisites:
Target must have writable /main/inc/lib/javascript/bigupload/files/ directory · Network access to the target Chamilo LMS instance
nomisec
WORKING POC
5 stars
by Rai2en · remote
https://github.com/Rai2en/CVE-2023-4220-Chamilo-LMS
This repository contains a functional exploit for CVE-2023-4220, an unauthenticated file upload vulnerability in Chamilo LMS. The exploit allows for remote code execution via webshell upload or reverse shell execution.
Classification
Working Poc 95%
Target:
Chamilo LMS versions before 1.11.24
No auth needed
Prerequisites:
Target URL with Chamilo LMS installation · Network connectivity to the target
nomisec
WORKING POC
5 stars
by Ziad-Sakr · remote
https://github.com/Ziad-Sakr/Chamilo-CVE-2023-4220-Exploit
This repository contains a functional exploit for CVE-2023-4220, an unrestricted file upload vulnerability in Chamilo LMS <= v1.11.24. The exploit uploads a reverse shell file to the vulnerable endpoint and triggers it to achieve remote code execution.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Access to the target Chamilo LMS instance · A reverse shell payload file
nomisec
WORKING POC
1 stars
by zora-beep · remote
https://github.com/zora-beep/CVE-2023-4220
This repository contains a functional exploit for CVE-2023-4220, which allows arbitrary file upload in Chamilo LMS. The exploit sends a POST request to a vulnerable endpoint to upload a webshell.
Classification
Working Poc 90%
Target:
Chamilo LMS (version not specified)
No auth needed
Prerequisites:
Access to the vulnerable endpoint · A webshell file to upload
nomisec
WORKING POC
1 stars
by Pr1or95 · remote
https://github.com/Pr1or95/CVE-2023-4220-exploit
This repository contains a functional exploit script for CVE-2023-4220, which targets an unrestricted file upload vulnerability in Chamilo LMS <= 1.11.24. The script uploads a webshell via the vulnerable endpoint and sets up a listener for remote code execution.
Classification
Working Poc 95%
Target:
Chamilo LMS <= 1.11.24
No auth needed
Prerequisites:
A webshell file · Target URL · Listener port
nomisec
WORKING POC
1 stars
by oxapavan · remote
https://github.com/oxapavan/CVE-2023-4220-HTB-PermX
This repository contains a functional exploit for CVE-2023-4220, an unrestricted file upload vulnerability in Chamilo LMS <= v1.11.24. The exploit leverages a flawed file upload mechanism in bigUpload.php to upload arbitrary files to a predictable directory.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · A file to upload (e.g., a web shell)
nomisec
WORKING POC
1 stars
by thefizzyfish · remote
https://github.com/thefizzyfish/CVE-2023-4220_Chamilo_RCE
This repository contains a functional Python exploit for CVE-2023-4220, an unrestricted file upload vulnerability in Chamilo LMS. The exploit uploads a PHP web shell to a vulnerable endpoint and triggers a reverse shell connection.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Target host running vulnerable Chamilo LMS · Network access to the target · Listener set up for reverse shell
nomisec
WORKING POC
1 stars
by 0x00-null · remote
https://github.com/0x00-null/Chamilo-CVE-2023-4220-RCE-Exploit
This repository contains a functional Python exploit for CVE-2023-4220, targeting an unauthenticated file upload vulnerability in Chamilo LMS <= 1.11.24. The exploit uploads a PHP web shell and executes arbitrary commands via HTTP requests.
Classification
Working Poc 95%
Target:
Chamilo LMS <= 1.11.24
No auth needed
Prerequisites:
Python 3.x · requests library · writable upload directory on target
nomisec
WORKING POC
1 stars
by N1ghtfallXxX · remote
https://github.com/N1ghtfallXxX/CVE-2023-4220
This repository contains a functional exploit for CVE-2023-4220, an unauthenticated RCE vulnerability in Chamilo LMS. It includes a Python script and a Bash script that upload a malicious PHP file to achieve remote code execution via a reverse shell.
Classification
Working Poc 95%
Target:
Chamilo LMS
No auth needed
Prerequisites:
Vulnerable Chamilo LMS instance · Listener to catch the reverse shell
nomisec
WORKING POC
1 stars
by dollarboysushil · remote
https://github.com/dollarboysushil/Chamilo-LMS-Unauthenticated-File-Upload-CVE-2023-4220
The repository provides a functional proof-of-concept for CVE-2023-4220, demonstrating an unauthenticated file upload vulnerability in Chamilo LMS. It includes a curl command to upload a malicious PHP file, leading to remote code execution.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Access to the target server's bigUpload.php endpoint · Ability to send HTTP requests to the target
nomisec
WORKING POC
by Sn0wBaall · remote
https://github.com/Sn0wBaall/CVE-2023-4220-PoC
This repository contains a functional exploit for CVE-2023-4220, targeting Chamilo LMS versions ≤ 1.11.24. The exploit automates the upload of a malicious PHP webshell via an unrestricted file upload vulnerability in the 'bigUpload' functionality, leading to remote code execution (RCE).
Classification
Working Poc 95%
Target:
Chamilo LMS ≤ 1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · Python environment with required libraries (pwntools, requests, termcolor)
nomisec
WORKING POC
by Least-Significant-Bit · remote
https://github.com/Least-Significant-Bit/CVE-2023-4220
This repository contains a functional exploit for CVE-2023-4220, an unauthenticated file upload vulnerability in Chamilo <= 1.11.24. The exploit uploads a PHP webshell via a vulnerable endpoint and executes arbitrary commands.
Classification
Working Poc 95%
Target:
Chamilo <= 1.11.24
No auth needed
Prerequisites:
Target must be running Chamilo <= 1.11.24 · Network access to the target
nomisec
WORKING POC
by 0xDTC · remote
https://github.com/0xDTC/Chamilo-LMS-CVE-2023-4220-Exploit
This repository contains a functional exploit for CVE-2023-4220, targeting Chamilo LMS versions ≤ v1.11.24. The exploit leverages an unrestricted file upload vulnerability in `bigUpload.php` to achieve remote code execution by uploading and executing a reverse shell.
Classification
Working Poc 90%
Target:
Chamilo LMS ≤ v1.11.24
No auth needed
Prerequisites:
Netcat installed on attacker's machine · Vulnerable Chamilo LMS instance · Attacker-controlled IP and port for reverse shell
nomisec
WORKING POC
by numaan911098 · remote
https://github.com/numaan911098/CVE-2023-4220
This repository contains a functional exploit for CVE-2023-4220, which targets a file upload vulnerability in the 'bigUpload.php' endpoint. The exploit uploads a malicious PHP file (reverse shell) and triggers its execution by accessing the uploaded file.
Classification
Working Poc 95%
Target:
Unknown (likely a web application using bigUpload.php)
No auth needed
Prerequisites:
Target URL with vulnerable endpoint · Reverse shell payload file
nomisec
WORKING POC
by H4cking4All · remote
https://github.com/H4cking4All/CVE-2023-4220
The repository contains a functional exploit for CVE-2023-4220, a file upload vulnerability in Chamilo <= 1.11.24. The exploit allows remote code execution by uploading a PHP webshell and triggering a reverse shell.
Classification
Working Poc 95%
Target:
Chamilo <= 1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo instance · Python environment with requests and pwntools libraries
nomisec
WORKING POC
by bueno-armando · remote
https://github.com/bueno-armando/CVE-2023-4220-RCE
This repository contains a functional exploit for CVE-2023-4220, which leverages an unrestricted file upload vulnerability in Chamilo LMS <= v1.11.24 to achieve remote code execution. The exploit uploads a malicious PHP file via the bigUpload.php endpoint and executes it to either run arbitrary commands or establish a reverse shell.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · Python 3.x environment
nomisec
WORKING POC
by VanishedPeople · remote
https://github.com/VanishedPeople/CVE-2023-4220
This repository contains a functional exploit for CVE-2023-4220, an unauthenticated RCE vulnerability in Chamilo LMS <= 1.11.24. The exploit leverages insufficient file upload validation to upload a malicious PHP webshell or reverse shell payload.
Classification
Working Poc 95%
Target:
Chamilo LMS <= 1.11.24
No auth needed
Prerequisites:
Python 3.x · requests library · vulnerable Chamilo LMS instance
nomisec
STUB
by qrxnz · poc
https://github.com/qrxnz/CVE-2023-4220
The repository contains only a README.md file with the CVE identifier and no additional technical details or exploit code. It is a placeholder with minimal content.
Target:
unknown
No auth needed
nomisec
WORKING POC
by LGenAgul · remote
https://github.com/LGenAgul/CVE-2023-4220-Proof-of-concept
This repository contains a functional exploit for CVE-2023-4220, an unauthenticated file upload vulnerability in Chamilo LMS <= v1.11.24. The exploit uploads a PHP reverse shell via the bigUpload functionality and triggers it to establish a reverse shell connection.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · A listener set up to receive the reverse shell
nomisec
WORKING POC
by charchit-subedi · remote
https://github.com/charchit-subedi/chamilo-lms-unauthenticated-rce-poc
This repository contains a functional Python exploit for CVE-2023-4220, targeting Chamilo LMS versions before 1.11.24. The exploit leverages an unauthenticated file upload vulnerability to achieve remote code execution via webshell or reverse shell payloads.
Classification
Working Poc 95%
Target:
Chamilo LMS < 1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · Python environment with requests library
nomisec
WORKING POC
by gmh5225 · remote
https://github.com/gmh5225/CVE-2023-4220
This repository contains a functional Python exploit for CVE-2023-4220, targeting Chamilo LMS. The exploit automates the upload of a web shell to a vulnerable endpoint, enabling remote code execution.
Classification
Working Poc 95%
Target:
Chamilo LMS (affected versions)
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · Vulnerable endpoint '/main/inc/lib/javascript/bigupload/inc/bigUpload.php' accessible
nomisec
WORKING POC
by m3m0o · remote
https://github.com/m3m0o/chamilo-lms-unauthenticated-big-upload-rce-poc
This repository contains a functional Python exploit for CVE-2023-4220, targeting Chamilo LMS versions before 1.11.24. The exploit leverages an unauthenticated file upload vulnerability to achieve remote code execution via webshell or reverse shell payloads.
Classification
Working Poc 95%
Target:
Chamilo LMS < 1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance · Python environment with requests library
github
WORKING POC
by dugisan3rd · pythonpoc
https://github.com/dugisan3rd/exploit/tree/main/CVE-2023-4220_chamilo_file_upload
The repository contains functional exploit code for multiple CVEs, including CVE-2023-4220 (Chamilo LMS RCE) and CVE-2023-27163 (request-baskets SSRF). The exploits demonstrate unauthenticated file upload leading to RCE and SSRF via crafted API requests.
Classification
Working Poc 95%
Target:
Chamilo LMS <= 1.11.24, request-baskets <= 1.2.1
No auth needed
Prerequisites:
network access to target · Python environment with dependencies
nomisec
WORKING POC
by Al3xGD · remote
https://github.com/Al3xGD/CVE-2023-4220-Exploit
This repository contains a functional exploit for CVE-2023-4220, targeting LMS Chamilo 1.11.24. The exploit leverages an unrestricted file upload vulnerability to achieve remote code execution (RCE) by uploading a malicious PHP shell.
Classification
Working Poc 95%
Target:
LMS Chamilo 1.11.24
No auth needed
Prerequisites:
Network access to the target · Target running LMS Chamilo 1.11.24
nomisec
WORKING POC
by nr4x4 · remote
https://github.com/nr4x4/CVE-2023-4220
This repository contains functional exploit code for CVE-2023-4220, an unauthenticated file upload vulnerability in Chamilo LMS leading to remote code execution. The exploit includes both Python and Bash scripts to upload a malicious PHP file and execute arbitrary commands.
Classification
Working Poc 95%
Target:
Chamilo LMS
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance
nomisec
WORKING POC
by HO4XXX · remote
https://github.com/HO4XXX/cve-2023-4220-poc
This repository contains a functional exploit PoC for CVE-2023-4220, targeting Chamilo LMS. The exploit leverages an arbitrary file upload vulnerability to achieve remote code execution (RCE) by uploading a malicious PHP file and triggering its execution.
Classification
Working Poc 95%
Target:
Chamilo LMS (version not specified)
No auth needed
Prerequisites:
Network access to the target Chamilo instance · Vulnerable endpoint exposed
vulncheck_xdb
WRITEUP
remote
https://github.com/Sahil-Makhija/CVE-reports-from-Perplexity
This repository contains a detailed technical analysis of CVE-2021-44228 (Log4Shell), including vulnerability mechanics, proof-of-concept steps, and mitigation strategies. It provides in-depth explanations of the JNDI lookup feature and its exploitation.
Classification
Writeup 100%
Target:
Apache Log4j2 versions 2.0-beta9 through 2.15.0
No auth needed
Prerequisites:
Vulnerable Log4j version · Network access to the target system
vulncheck_xdb
WORKING POC
remote
https://github.com/krishnan-tech/CVE-2023-4226-POC
The repository contains a functional Python script that exploits an unrestricted file upload vulnerability in Chamilo LMS (CVE-2023-4220). It allows unauthenticated attackers to upload a malicious PHP file to achieve remote code execution (RCE) via either direct command execution or a reverse shell.
Classification
Working Poc 95%
Target:
Chamilo LMS <= v1.11.24
No auth needed
Prerequisites:
Network access to the target Chamilo LMS instance
metasploit
WORKING POC
EXCELLENT
by Ngo Wei Lin, jheysel-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/chamilo_bigupload_webshell.rb
This Metasploit module exploits an unrestricted file upload vulnerability in Chamilo LMS v1.11.24 via the bigUpload.php endpoint, allowing attackers to upload a PHP webshell by bypassing file extension checks using the 'post-unsupported' action parameter.
Classification
Working Poc 100%
Target:
Chamilo LMS v1.11.24
No auth needed
Prerequisites:
Target must have the /main/inc/lib/javascript/bigupload/files/ directory present