Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220 | https://github.com/m3m0o/chamilo-lms-unauthenticated-big-upload-rce-poc | POC Details |
| 2 | Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell. | https://github.com/dollarboysushil/Chamilo-LMS-Unauthenticated-File-Upload-CVE-2023-4220 | POC Details |
| 3 | https://starlabs.sg/advisories/23/23-4220/ | https://github.com/charlesgargasson/CVE-2023-4220 | POC Details |
| 4 | CVE-2023-4220 POC RCE | https://github.com/insomnia-jacob/CVE-2023-4220- | POC Details |
| 5 | This is an Exploit for Unrestricted file upload in big file upload functionality in Chamilo-LMS for this location "/main/inc/lib/javascript/bigupload/inc/bigUpload.php" in Chamilo LMS <= v1.11.24, and Attackers can obtain remote code execution via uploading of web shell. | https://github.com/Ziad-Sakr/Chamilo-LMS-CVE-2023-4220-Exploit | POC Details |
| 6 | This is an Exploit for Unrestricted file upload in big file upload functionality in Chamilo-LMS for this location "/main/inc/lib/javascript/bigupload/inc/bigUpload.php" in Chamilo LMS <= v1.11.24, and Attackers can obtain remote code execution via uploading of web shell. | https://github.com/Ziad-Sakr/Chamilo-CVE-2023-4220-Exploit | POC Details |
| 7 | PoC for CVE-2023-4220 - Chamilo LMS - Unauthenticated File Upload in BigUpload | https://github.com/HO4XXX/cve-2023-4220-poc | POC Details |
| 8 | Proof of concept exploit for CVE-2023-4220 | https://github.com/B1TC0R3/CVE-2023-4220-PoC | POC Details |
| 9 | CVE-2023–4220 Exploit | https://github.com/nr4x4/CVE-2023-4220 | POC Details |
| 10 | LMS Chamilo 1.11.24 CVE-2023-4220 Exploit | https://github.com/Al3xGD/CVE-2023-4220-Exploit | POC Details |
| 11 | CVE-2023-4220 POC RCE | https://github.com/insomnia-jacob/CVE-2023-4220 | POC Details |
| 12 | This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220 | https://github.com/charchit-subedi/chamilo-lms-unauthenticated-rce-poc | POC Details |
| 13 | Chamilo LMS Unauthenticated Big Upload File that allows remote code execution | https://github.com/LGenAgul/CVE-2023-4220-Proof-of-concept | POC Details |
| 14 | None | https://github.com/VanishedPeople/CVE-2023-4220 | POC Details |
| 15 | Python exploit for Chamilo Unrestricted File Upload Vuln - CVE-2023-4220 | https://github.com/thefizzyfish/CVE-2023-4220 | POC Details |
| 16 | CVE-2023-4220 Chamilo Exploit | https://github.com/qrxnz/CVE-2023-4220 | POC Details |
| 17 | (CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution | https://github.com/0x00-null/-Chamilo-CVE-2023-4220-RCE-Exploit | POC Details |
| 18 | (CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution | https://github.com/0x00-null/Chamilo-CVE-2023-4220-RCE-Exploit | POC Details |
| 19 | None | https://github.com/bueno-armando/CVE-2023-4220-RCE | POC Details |
| 20 | Refurbish Chamilo LMS CVE-2023-4220 exploit written in bash | https://github.com/TanveerS1ngh/Chamilo-LMS-CVE-2023-4220-Exploit | POC Details |
| 21 | CVE-2023-4220 Chamilo Exploit | https://github.com/H4cking4All/CVE-2023-4220 | POC Details |
| 22 | Python exploit for Chamilo Unrestricted File Upload Vuln - CVE-2023-4220 | https://github.com/thefizzyfish/CVE-2023-4220_Chamilo_RCE | POC Details |
| 23 | None | https://github.com/oxapavan/CVE-2023-4220-HTB-PermX | POC Details |
| 24 | Refurbish Chamilo LMS CVE-2023-4220 exploit written in bash | https://github.com/0xDTC/Chamilo-LMS-CVE-2023-4220-Exploit | POC Details |
| 25 | https://nvd.nist.gov/vuln/detail/CVE-2023-4220 | https://github.com/numaan911098/CVE-2023-4220 | POC Details |
| 26 | Remote command execution exploit made for redteamers. | https://github.com/MikeyPPPPPPPP/CVE-2023-4220 | POC Details |
| 27 | Carga de archivos sin restricciones en la funcionalidad de carga de archivos grandes en `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` en Chamilo LMS en versiones <= 1.11.24 permite a atacantes no autenticados realizar ataques de Cross Site Scripting almacenados y obtener código remoto ejecución mediante la carga de web shell. | https://github.com/Pr1or95/CVE-2023-4220-exploit | POC Details |
| 28 | Exploit for CVE-2023-4220 | https://github.com/zora-beep/CVE-2023-4220 | POC Details |
| 29 | Chamilo LMS Unauthenticated Remote Code Execution | https://github.com/N1ghtfallXxX/CVE-2023-4220 | POC Details |
| 30 | CVE-2023-4220 POC RCE | https://github.com/gmh5225/CVE-2023-4220 | POC Details |
| 31 | Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-4220.yaml | POC Details |
| 32 | This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220 | https://github.com/Rai2en/CVE-2023-4220-Chamilo-LMS | POC Details |
| 33 | Unauthenticated file upload for Chamilo 1.11.24 and lower | https://github.com/Least-Significant-Bit/CVE-2023-4220 | POC Details |
| 34 | None | https://github.com/Sn0wBaall/CVE-2023-4220-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet