diff --git a/db/modules_metadata_base.json b/db/modules_metadata_base.json index 537aa61d1fcd..d9ee4880343a 100644 --- a/db/modules_metadata_base.json +++ b/db/modules_metadata_base.json @@ -70657,6 +70657,67 @@ "session_types": false, "needs_cleanup": true }, + "exploit_linux/http/chamilo_bigupload_webshell": { + "name": "Chamilo v1.11.24 Unrestricted File Upload PHP Webshell", + "fullname": "exploit/linux/http/chamilo_bigupload_webshell", + "aliases": [ + + ], + "rank": 600, + "disclosure_date": "2023-11-28", + "type": "exploit", + "author": [ + "Ngo Wei Lin", + "jheysel-r7" + ], + "description": "Chamilo LMS is a free software e-learning and content management system. In versions prior to <= v1.11.24\n a webshell can be uploaded via the bigload.php endpoint. If the GET request parameter `action` is set to\n `post-unsupported` file extension checks are skipped allowing for attacker controlled .php files to be uploaded to:\n `/main/inc/lib/javascript/bigupload/files/` if the `/files/` directory already exists - it does not exist\n by default.", + "references": [ + "URL-https://starlabs.sg/advisories/23/23-4220/", + "URL-https://github.com/H4cking4All/CVE-2023-4220/tree/main", + "CVE-2023-4220" + ], + "platform": "PHP", + "arch": "php", + "rport": 80, + "autofilter_ports": [ + 80, + 8080, + 443, + 8000, + 8888, + 8880, + 8008, + 3000, + 8443 + ], + "autofilter_services": [ + "http", + "https" + ], + "targets": [ + "PHP" + ], + "mod_time": "2024-11-14 10:46:11 +0000", + "path": "/modules/exploits/linux/http/chamilo_bigupload_webshell.rb", + "is_install_path": true, + "ref_name": "linux/http/chamilo_bigupload_webshell", + "check": true, + "post_auth": false, + "default_credential": false, + "notes": { + "Stability": [ + "crash-safe" + ], + "SideEffects": [ + "artifacts-on-disk" + ], + "Reliability": [ + "repeatable-session" + ] + }, + "session_types": false, + "needs_cleanup": true + }, "exploit_linux/http/chamilo_unauth_rce_cve_2023_34960": { "name": "Chamilo unauthenticated command injection in PowerPoint upload", "fullname": "exploit/linux/http/chamilo_unauth_rce_cve_2023_34960",