Description
A remote code execution vulnerability exists in Chamilo through 1.11.14 due to improper input sanitization of a parameter used for file uploads, and improper file-extension filtering for certain filenames (e.g., .phar or .pht). A remote authenticated administrator is able to upload a file containing arbitrary PHP code into specific directories via main/inc/lib/fileUpload.lib.php directory traversal to achieve PHP code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:10:31.405Z
Reserved: 2021-04-30T00:00:00.000Z
Link: CVE-2021-31933
No data.
Status : Modified
Published: 2021-04-30T21:15:09.000
Modified: 2024-11-21T06:06:32.513
Link: CVE-2021-31933
No data.
OpenCVE Enrichment
No data.
Weaknesses