Vulnerability type:- CWE-95:Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Vulnerability vector:
- Base vulnerability score (CVSSv3.1): CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity (CVSSv3.1): 9.8 (critical)
- Base vulnerability score (CVSSv4.0): CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
- Severity (CVSSv4.0): 9.5 (critical)
Description:
The vulnerability was identified in Chamilo LMS versions 1.11.x up to 1.11.26.
The discovered vulnerability can be exploited by an unauthenticated attacker, if he sends SOAP request with parameter, which is evaluated without filtering, that leads to Remote Code Execution.
Vulnerability status: Confirmed by vendor
Date of vulnerability remediation: 22.10.2024
Recommendations: Update to version 1.11.28 or higher
Additional information: Security Bulletin
Researcher: Vladimir Vlasov (Positive Technologies)
Identifier:
CVE-2024-50337
BDU:2024-10118
Vendor:
The Chamilo Association
Vulnerable product:
Chamilo LMS
Vulnerable version:
1.11.x up to 1.11.26
Get in touch
Fill in the form and our specialists
will contact you shortly
will contact you shortly