支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2025-69581 基础信息
漏洞信息
                                        # N/A

## 概述
Chamillo LMS 1.11.2 中的 Social Network `/personal_data` 接口在用户登出后仍暴露完整的敏感用户信息,因缺失适当的缓存控制策略。

## 影响版本
Chamillo LMS 1.11.2

## 细节
`/personal_data` 接口未设置有效的 `Cache-Control` 或 `Pragma` HTTP 头,导致响应被浏览器缓存。用户登出后,通过浏览器返回按钮可从缓存中恢复已缓存的个人数据页面,无需重新认证。

## 影响
同一设备上的未授权用户可访问敏感个人信息,导致用户画像、身份冒用、针对性攻击及严重隐私泄露风险。
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
来源:美国国家漏洞数据库 NVD
漏洞描述信息
An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Using the browser back button restores all personal data, allowing unauthorized users on the same device to view confidential information. This leads to profiling, impersonation, targeted attacks, and significant privacy risks.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-69581 的公开POC
#POC 描述源链接神龙链接
1 An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India.https://github.com/Rivek619/CVE-2025-69581POC详情
三、漏洞 CVE-2025-69581 的情报信息
  • 标题: GitHub - Rivek619/CVE-2025-69581: An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India. -- 🔗来源链接

    标签:

    神龙速读:
                                            ## CVE-2025-69581
    
    ### Affected Product
    - **Product:** Chamilo LMS
    - **Version:** 1.11.2
    
    ### Discovered By
    - **Discoverer:** Rivek Raj Tamang (RivuDon), Sikkim, India
    
    ### Vulnerability Details
    - **Type:** Information Disclosure
    
    ### Summary
    The vulnerability allows unauthorized access to sensitive user information in Chamilo LMS 1.11.2 due to improper client-side session handling and missing cache-control headers. After logging out, user-specific PII remains accessible simply by pressing the browser's back button, exposing sensitive account details without reauthentication. This flaw constitutes an Information Disclosure vulnerability and poses a risk to user privacy and session integrity.
    
    ### Steps to Reproduce
    1. Have a valid account
    2. Log into the account
    3. Go to Social Network > Personal Data
    4. Click on user_info
    5. Note all the Sensitive PII Information
    6. Now simply click on logout and wait for the page to log out
    7. Now click on the browser back button. Note all the PII being disclosed clearly without any proper cache control
    
    ### Acknowledgement
    This vulnerability was discovered and responsibly reported by:
    - **Rivek Raj Tamang (RivuDon) from Sikkim, India**
    - [LinkedIn](https://www.linkedin.com/in/rivektamang/)
    - [Medium](https://rivudon.medium.com/)
                                            
    GitHub - Rivek619/CVE-2025-69581: An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India.
  • 标题: GitHub - chamilo/chamilo-lms: Chamilo is a learning management system focused on ease of use and accessibility -- 🔗来源链接

    标签:

    神龙速读:
                                            ## 关键漏洞信息
    
    从该网页截图中,可以获取到以下关于漏洞的关键信息:
    
    ### 1. **测试和CI/CD状态**
    - **Behat Tests**: Failing  
    - **PHPUnit**: Failing  
    - **Scrutinizer**: Level 4.98  
    - **Security**: Not failing  
    
    ### 2. **代码质量**
    - **phpstan Level 7**: Verified  
    - **PHPMD**: Verified  
    - **Code Climate**: Failing  
    
    ### 3. **版本信息**
    - **Latest release**: v1.11.32  
    
    ### 4. **软件和环境要求**
    - **NodeJS**: v18+  
    - **PHP**: 8.2 or 8.3  
    - **Gateways**:requires translations/ in the config.php file (requires the yamllint PHP installation)
    - **Redis**: Required for storing PHP sessions
    
    ### 5. **安全和配置**
    - **Security Policy**: Mentioned as an important document.
    - **Environment Variable**: The `.env` file controls the configuration mode. Dev environment is slower than prod.
    
    ### 6. **开发和调试**
    - **Testing Frameworks**: PHPUnit and Behat are used, but currently failing.
    - **Branches**: The `master` branch is of development focus.
    
    ## 注意事项
    - The screenshot provides detailed installation instructions for environments like Ubuntu.
    - It lists hardware and software prerequisites for running Chamilo 2.
                                            
    GitHub - chamilo/chamilo-lms: Chamilo is a learning management system focused on ease of use and accessibility
  • https://nvd.nist.gov/vuln/detail/CVE-2025-69581
四、漏洞 CVE-2025-69581 的评论

暂无评论


发表评论