PT-2024-45: Evaluation of untrusted user input in Chamilo LMS

CRITICAL
(9.5) CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Vulnerability type:
  • CWE-95:Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

Vulnerability vector:

  • Base vulnerability score (CVSSv3.1): CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Severity (CVSSv3.1): 9.8 (critical)
  • Base vulnerability score (CVSSv4.0): CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
  • Severity (CVSSv4.0): 9.5 (critical)

Description:

The vulnerability was identified in Chamilo LMS versions 1.11.x up to 1.11.26.

The discovered vulnerability can be exploited by an unauthenticated attacker, if he sends SOAP request with parameter, which is evaluated without filtering, that leads to Remote Code Execution.

Vulnerability status: Confirmed by vendor

Date of vulnerability remediation: 22.10.2024

Recommendations: Update to version 1.11.28 or higher

Additional information: Security Bulletin

Researcher: Vladimir Vlasov (Positive Technologies)

Identifier:
CVE-2024-50337
BDU:2024-10118
Vendor:
The Chamilo Association
Vulnerable product:
Chamilo LMS
Vulnerable version:
1.11.x up to 1.11.26

Get in touch

Fill in the form and our specialists
will contact you shortly