8.1
HIGH
CVE-2023-4220
"Chamilo LMS Unrestricted File Upload Vulnerability"
Description

Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.

INFO

Published Date :

Nov. 28, 2023, 8:15 a.m.

Last Modified :

Dec. 4, 2023, 2:53 p.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

2.2
Public PoC/Exploit Available at Github

CVE-2023-4220 has a 25 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2023-4220 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Chamilo chamilo_lms
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2023-4220.

URL Resource
https://github.com/chamilo/chamilo-lms/commit/3b487a55076fb06f96809b790a35dcdd42f8ec49 Patch
https://starlabs.sg/advisories/23/23-4220 Exploit Third Party Advisory
https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-130-2023-09-04-Critical-impact-High-risk-Unauthenticated-users-may-gain-XSS-and-unauthenticated-RCE-CVE-2023-4220 Issue Tracking Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

https://nvd.nist.gov/vuln/detail/CVE-2023-4220

Python PHP

Updated: 1 week, 3 days ago
0 stars 0 fork 0 watcher
Born at : Nov. 13, 2024, 8:30 a.m. This repo has been linked 1 different CVEs too.

None

Shell

Updated: 1 week, 4 days ago
1 stars 0 fork 0 watcher
Born at : Nov. 10, 2024, 6:13 p.m. This repo has been linked 1 different CVEs too.

Demonstrating my hands-on skills in security testing, including rooted machines, research, tool usage, and documentation of findings.

Updated: 1 week, 5 days ago
0 stars 0 fork 0 watcher
Born at : Nov. 10, 2024, 7:06 a.m. This repo has been linked 4 different CVEs too.

CVE-2023-4220 Chamilo Exploit

Python

Updated: 2 weeks, 6 days ago
0 stars 0 fork 0 watcher
Born at : Nov. 2, 2024, 2:49 p.m. This repo has been linked 1 different CVEs too.

Refurbish Chamilo LMS CVE-2023-4220 exploit written in bash

Shell

Updated: 3 weeks, 5 days ago
0 stars 0 fork 0 watcher
Born at : Oct. 27, 2024, 8:18 p.m. This repo has been linked 1 different CVEs too.

None

Python

Updated: 1 month ago
0 stars 0 fork 0 watcher
Born at : Oct. 23, 2024, 4:01 a.m. This repo has been linked 1 different CVEs too.

(CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution

Python

Updated: 2 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Sept. 3, 2024, 12:16 p.m. This repo has been linked 1 different CVEs too.

CVE-2023-4220 Chamilo Exploit

Updated: 2 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Aug. 27, 2024, 5:12 p.m. This repo has been linked 1 different CVEs too.

Python exploit for Chamilo Unrestricted File Upload Vuln - CVE-2023-4220

Python

Updated: 2 months, 3 weeks ago
1 stars 0 fork 0 watcher
Born at : Aug. 24, 2024, 3:25 p.m. This repo has been linked 2 different CVEs too.

CVE-2023-4220 PoC Chamilo RCE

Python PHP

Updated: 2 months, 2 weeks ago
0 stars 0 fork 0 watcher
Born at : Aug. 24, 2024, 5:32 a.m. This repo has been linked 1 different CVEs too.

Chamilo LMS Unauthenticated Big Upload File that allows remote code execution

Python

Updated: 3 months ago
0 stars 0 fork 0 watcher
Born at : Aug. 18, 2024, 8 p.m. This repo has been linked 1 different CVEs too.

This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220

Python

Updated: 3 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Aug. 2, 2024, 6:14 a.m. This repo has been linked 1 different CVEs too.

My writeups for various Hack The Box challenges, detailing step-by-step solutions.

Updated: 1 week, 1 day ago
0 stars 0 fork 0 watcher
Born at : July 19, 2024, 4:13 p.m. This repo has been linked 1 different CVEs too.

LMS Chamilo 1.11.24 CVE-2023-4220 Exploit

Python PHP

Updated: 4 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : July 15, 2024, 1:38 a.m. This repo has been linked 1 different CVEs too.

CVE-2023–4220 Exploit

Shell Python

Updated: 4 months, 1 week ago
0 stars 0 fork 0 watcher
Born at : July 11, 2024, 1:06 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2023-4220 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2023-4220 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • Initial Analysis by [email protected]

    Dec. 04, 2023

    Action Type Old Value New Value
    Added CVSS V3.1 NIST AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    Changed Reference Type https://github.com/chamilo/chamilo-lms/commit/3b487a55076fb06f96809b790a35dcdd42f8ec49 No Types Assigned https://github.com/chamilo/chamilo-lms/commit/3b487a55076fb06f96809b790a35dcdd42f8ec49 Patch
    Changed Reference Type https://starlabs.sg/advisories/23/23-4220 No Types Assigned https://starlabs.sg/advisories/23/23-4220 Exploit, Third Party Advisory
    Changed Reference Type https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-130-2023-09-04-Critical-impact-High-risk-Unauthenticated-users-may-gain-XSS-and-unauthenticated-RCE-CVE-2023-4220 No Types Assigned https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-130-2023-09-04-Critical-impact-High-risk-Unauthenticated-users-may-gain-XSS-and-unauthenticated-RCE-CVE-2023-4220 Issue Tracking, Vendor Advisory
    Added CWE NIST CWE-434
    Added CWE NIST CWE-79
    Added CPE Configuration OR *cpe:2.3:a:chamilo:chamilo_lms:*:*:*:*:*:*:*:* versions up to (including) 1.11.24
  • CVE Received by [email protected]

    Nov. 28, 2023

    Action Type Old Value New Value
    Added Description Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
    Added Reference STAR Labs SG Pte. Ltd. https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-130-2023-09-04-Critical-impact-High-risk-Unauthenticated-users-may-gain-XSS-and-unauthenticated-RCE-CVE-2023-4220 [No types assigned]
    Added Reference STAR Labs SG Pte. Ltd. https://starlabs.sg/advisories/23/23-4220 [No types assigned]
    Added Reference STAR Labs SG Pte. Ltd. https://github.com/chamilo/chamilo-lms/commit/3b487a55076fb06f96809b790a35dcdd42f8ec49 [No types assigned]
    Added CWE STAR Labs SG Pte. Ltd. CWE-434
    Added CVSS V3.1 STAR Labs SG Pte. Ltd. AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2023-4220 is associated with the following CWEs:

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

5.08 }} 1.43%

score

0.93152

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability