9.8
CRITICAL
CVE-2023-34960
Chamilo WSConvertPpt Command Injection Vulnerability
Description

A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.

INFO

Published Date :

Aug. 1, 2023, 2:15 a.m.

Last Modified :

Nov. 21, 2024, 8:07 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

3.9
Public PoC/Exploit Available at Github

CVE-2023-34960 has a 20 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-34960 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Chamilo chamilo_lms
2 Chamilo chamilo

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

chamilo soap api rce (/webservices/additional_webservices.php)

Updated: 4 weeks ago
0 stars 0 fork 0 watcher
Born at : March 30, 2025, 11:48 p.m. This repo has been linked 1 different CVEs too.

自动搜集每天的漏洞poc和exp信息。

Updated: 2 months, 2 weeks ago
8 stars 2 fork 2 watcher
Born at : Dec. 11, 2024, 12:32 a.m. This repo has been linked 91 different CVEs too.

Automatic vuln scanner and exploiter for l7 ddos attacks using Chamilio CVE-2023-34960

botnet botnet-tool cve cve-2023-34960 ddos ddos-attacks ddos-tool exploit exploiter l7 l7-ddos layer7 layer7-ddos scanner chamilio

Python

Updated: 4 months, 1 week ago
3 stars 1 fork 1 watcher
Born at : July 13, 2024, 8:30 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 8 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : July 7, 2024, 8:26 p.m. This repo has been linked 1 different CVEs too.

None

Updated: 5 months ago
1 stars 0 fork 0 watcher
Born at : May 16, 2024, 2:53 p.m. This repo has been linked 48 different CVEs too.

渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

Assembly Python Shell PHP C++ C Go Ruby HTML Java

Updated: 3 weeks, 4 days ago
12 stars 0 fork 0 watcher
Born at : Feb. 7, 2024, 2:08 p.m. This repo has been linked 305 different CVEs too.

PoC. Severity critical.

Shell Ruby Python PHP

Updated: 1 year, 8 months ago
0 stars 1 fork 1 watcher
Born at : Aug. 10, 2023, 8:31 p.m. This repo has been linked 18 different CVEs too.

PoC. Severity critical.

cve-2023-1671 cve-2023-27350 cve-2023-2868 cve-2023-3519 cve-2023-34960 exploit poc cve-2023-28121 cve-2023-28771 cve-2023-35885 cve-2023-38646 cve-2023-34124 citrix sonicwall cve-2023-4596 cve-2023-26469 cve-2023-23333 ivanti cve-2023-40044 cve-2023-22515

Shell Python Ruby PHP

Updated: 3 weeks, 4 days ago
70 stars 16 fork 16 watcher
Born at : Aug. 5, 2023, 11:02 a.m. This repo has been linked 38 different CVEs too.

Perform with Massive Command Injection (Chamilo)

Python Nix PowerShell Shell Cython C C++ Batchfile Fortran Forth

Updated: 1 year, 8 months ago
0 stars 1 fork 1 watcher
Born at : Aug. 1, 2023, 8:09 a.m. This repo has been linked 1 different CVEs too.

各种漏洞批量扫描poc、exp,涵盖未授权、RCE、文件上传、sql注入、信息泄露等

Python

Updated: 1 month, 3 weeks ago
283 stars 61 fork 61 watcher
Born at : July 25, 2023, 3:18 a.m. This repo has been linked 11 different CVEs too.

None

Python

Updated: 2 months, 3 weeks ago
4 stars 3 fork 3 watcher
Born at : July 24, 2023, 8:51 p.m. This repo has been linked 1 different CVEs too.

Perform with Massive Command Injection (Chamilo)

chamilo command-injection rce

Python

Updated: 5 months, 2 weeks ago
21 stars 6 fork 6 watcher
Born at : July 22, 2023, 5:27 a.m. This repo has been linked 1 different CVEs too.

Chamilo CVE-2023-34960 Batch scan/exploit

Python

Updated: 5 months, 3 weeks ago
0 stars 1 fork 1 watcher
Born at : July 9, 2023, 11:24 a.m. This repo has been linked 1 different CVEs too.

Wordpress CVE-2023-34960

cve-2023-34960 exploit vulnerability wordpress wordpress-vulnerability exploit-wordpress

Python

Updated: 4 months, 2 weeks ago
2 stars 1 fork 1 watcher
Born at : July 3, 2023, 11:17 a.m. This repo has been linked 1 different CVEs too.

自己写的一些exp

Python Shell

Updated: 11 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : June 22, 2023, 2:10 p.m. This repo has been linked 2 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-34960 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-34960 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference http://chamilo.com
    Added Reference http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html
    Added Reference https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Aug. 24, 2023

    Action Type Old Value New Value
    Added Reference http://packetstormsecurity.com/files/174314/Chamilo-1.11.18-Command-Injection.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Aug. 04, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type http://chamilo.com No Types Assigned http://chamilo.com Product
    Changed Reference Type https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution No Types Assigned https://support.chamilo.org/projects/1/wiki/Security_issues#Issue-112-2023-04-20-Critical-impact-High-risk-Remote-Code-Execution Issue Tracking, Vendor Advisory
    Added CWE NIST CWE-77
    Added CPE Configuration OR *cpe:2.3:a:chamilo:chamilo:*:*:*:*:*:*:*:* versions from (including) 1.11.0 up to (including) 1.11.18
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-34960 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

93.99 }} 0.26%

score

0.99874

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
© cvefeed.io
Latest DB Update: Apr. 28, 2025 3:42