# N/A
## 概述
Chamillo LMS 1.11.2 中的 Social Network `/personal_data` 接口在用户登出后仍暴露完整的敏感用户信息,因缺失适当的缓存控制策略。
## 影响版本
Chamillo LMS 1.11.2
## 细节
`/personal_data` 接口未设置有效的 `Cache-Control` 或 `Pragma` HTTP 头,导致响应被浏览器缓存。用户登出后,通过浏览器返回按钮可从缓存中恢复已缓存的个人数据页面,无需重新认证。
## 影响
同一设备上的未授权用户可访问敏感个人信息,导致用户画像、身份冒用、针对性攻击及严重隐私泄露风险。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India. | https://github.com/Rivek619/CVE-2025-69581 | POC详情 |
标题: GitHub - Rivek619/CVE-2025-69581: An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India. -- 🔗来源链接
标签:
神龙速读:
## CVE-2025-69581
### Affected Product
- **Product:** Chamilo LMS
- **Version:** 1.11.2
### Discovered By
- **Discoverer:** Rivek Raj Tamang (RivuDon), Sikkim, India
### Vulnerability Details
- **Type:** Information Disclosure
### Summary
The vulnerability allows unauthorized access to sensitive user information in Chamilo LMS 1.11.2 due to improper client-side session handling and missing cache-control headers. After logging out, user-specific PII remains accessible simply by pressing the browser's back button, exposing sensitive account details without reauthentication. This flaw constitutes an Information Disclosure vulnerability and poses a risk to user privacy and session integrity.
### Steps to Reproduce
1. Have a valid account
2. Log into the account
3. Go to Social Network > Personal Data
4. Click on user_info
5. Note all the Sensitive PII Information
6. Now simply click on logout and wait for the page to log out
7. Now click on the browser back button. Note all the PII being disclosed clearly without any proper cache control
### Acknowledgement
This vulnerability was discovered and responsibly reported by:
- **Rivek Raj Tamang (RivuDon) from Sikkim, India**
- [LinkedIn](https://www.linkedin.com/in/rivektamang/)
- [Medium](https://rivudon.medium.com/)
标题: GitHub - chamilo/chamilo-lms: Chamilo is a learning management system focused on ease of use and accessibility -- 🔗来源链接
标签:
神龙速读:
## 关键漏洞信息
从该网页截图中,可以获取到以下关于漏洞的关键信息:
### 1. **测试和CI/CD状态**
- **Behat Tests**: Failing
- **PHPUnit**: Failing
- **Scrutinizer**: Level 4.98
- **Security**: Not failing
### 2. **代码质量**
- **phpstan Level 7**: Verified
- **PHPMD**: Verified
- **Code Climate**: Failing
### 3. **版本信息**
- **Latest release**: v1.11.32
### 4. **软件和环境要求**
- **NodeJS**: v18+
- **PHP**: 8.2 or 8.3
- **Gateways**:requires translations/ in the config.php file (requires the yamllint PHP installation)
- **Redis**: Required for storing PHP sessions
### 5. **安全和配置**
- **Security Policy**: Mentioned as an important document.
- **Environment Variable**: The `.env` file controls the configuration mode. Dev environment is slower than prod.
### 6. **开发和调试**
- **Testing Frameworks**: PHPUnit and Behat are used, but currently failing.
- **Branches**: The `master` branch is of development focus.
## 注意事项
- The screenshot provides detailed installation instructions for environments like Ubuntu.
- It lists hardware and software prerequisites for running Chamilo 2.
暂无评论