POC详情: 8cd1c9753cc0ffd3c1a2f5572288a975e952fd5a

来源
关联漏洞
标题: Chamilo LMS 安全漏洞 (CVE-2023-4220)
描述:Chamilo LMS是Chamilo协会的一套开源的在线学习和协作系统。该系统支持创建教学内容、远程培训和在线答题等。 Chamilo LMS v1.11.24 版本及之前版本存在安全漏洞,该漏洞源于 “/main/inc/lib/javascript/bigupload/inc/bigUpload.php”页面存在大文件上传功能存在不受限制的文件上传。
描述
This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220
介绍
# Chamilo LMS Unauthenticated Big Upload File RCE PoC

This is a script written in Python that allows the exploitation of the **Chamilo's LMS** software security flaw described in **CVE-2023-4220**.  The system is vulnerable in versions preceding **1.11.24**.

## Usage

Clone the repository to your machine and install the dependencies using **pip** (it is recommended to use **virtualenv** to create an environment to separate these installations from global installations)

```bash
git clone https://github.com/m3m0o/chamilo-lms-unauthenticated-big-upload-rce-poc
cd chamilo-lms-unauthenticated-big-upload-rce-poc
pip install -r requirements.txt
```

The script needs the **target URL** with the **Chamilo's** root path (like **http://example.com/chamilo, http://example.com** or **http://chamilo.example.com)** and a action to perform (there is three of them available: **scan, webshell** and **revshell**).

### Scan
 
This action will check if the target is vulnerable by trying to access the **/main/inc/lib/javascript/bigupload/files/** endpoint.

```bash
python3 main.py -u http://example.com/chamilo -a scan
```

![scan-demo](https://github.com/m3m0o/chamilo-lms-unauthenticated-big-upload-rce-poc/assets/130102748/d2823f86-72dc-4aff-9e69-28b9b35b8b79)

### Webshell

This action will create a **PHP webshell** file in the vulnerable endpoint.

```bash
python3 main.py -u http://example.com/chamilo -a webshell
```

![webshell-demo](https://github.com/m3m0o/chamilo-lms-unauthenticated-big-upload-rce-poc/assets/130102748/24bbc11c-868c-4d4d-917e-ec218ea015ca)

### Revshell

This action will create and execute a **bash reverse shell** file. To do this, a **webshell** will first be created using the same method used in the previous action. After that, some commands will be executed to create and execute the **bash** file. Be sure to be listening on the port you defined with **nc** or any other utilitary so you actually get the reverse connection. Also, the host can be a valid **internal/public IPv4** (like **172.17.1.4** or **186.227.4.31)** or the domain that you have registered (like **evil-vps.domainreg.net**)

```bash
python3 main.py -u http://example.com/chamilo -a revshell
```

![revshell-demo](https://github.com/m3m0o/chamilo-lms-unauthenticated-big-upload-rce-poc/assets/130102748/6a403bc6-e951-432b-ad67-3f614c3b87a1)

**OBS:** Soon I will be adding an **Windows** payload option for **Windows** hosts

## References

[(CVE-2023-4220) Chamilo LMS Unauthenticated Big Upload File Remote Code Execution](https://starlabs.sg/advisories/23/23-4220/)
文件快照

[4.0K] /data/pocs/8cd1c9753cc0ffd3c1a2f5572288a975e952fd5a ├── [2.3K] exploit.py ├── [ 11K] LICENSE ├── [3.5K] main.py └── [2.5K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。