A remote code execution vulnerability exists in Chamilo through 1.11.14 due to improper input sanitization of a parameter used for file uploads, and improper file-extension filtering for certain filenames (e.g., .phar or .pht). A remote authenticated administrator is able to upload a file containing arbitrary PHP code into specific directories via main/inc/lib/fileUpload.lib.php directory traversal to achieve PHP code execution.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:10:31.405Z
Reserved: 2021-04-30T00:00:00
Link: CVE-2021-31933
No data.
Status : Modified
Published: 2021-04-30T21:15:09.000
Modified: 2024-11-21T06:06:32.513
Link: CVE-2021-31933
No data.
OpenCVE Enrichment
No data.
Weaknesses