Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place. Commercial Alternative to JupyterHub.
Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place. Commercial Alternative to JupyterHub.
Path: blob/master/documentation/modules/exploit/linux/http/chamilo_bigupload_webshell.md
Views: 16005
Vulnerable Application
Chamilo LMS is a free software e-learning and content management system. In versions prior to <= v1.11.24 a webshell can be uploaded via the bigload.php endpoint. If the GET request parameter action
is set to post-unsupported
file extension checks are skipped allowing for attacker controlled .php files to be uploaded to: /main/inc/lib/javascript/bigupload/files/
if the /files/
directory already exists - it does not exist by default.
Setup
A vulnerable docker-compose configuration can be found at the following link: https://github.com/vulhub/vulhub/pull/559
Clone the repo
git clone https://github.com/vulhub/vulhub.git
Checkout the pull request mentioned above:
git checkout CVE-2023-4220
Run
cd vulhub/chamilo/CVE-2023-4220
Start the environment:
docker compose up
Navigate to
http://127.0.0.1:8080
to complete the installation wizard.Note when filling out the database IP address and credentials - the DB hostname is the name of the container which is
mariadb
(notlocalhost
or127.0.0.1
).Once the installation wizard is complete the target should be ready to be exploited with the module. This container has the non-default
/files/
directory created already.
Verification Steps
Start msfconsole
Do:
use linux/http/chamilo_bigupload_webshell
Set the
RHOST
,RPORT
, andLHSOT
optionsRun the module
Receive a Meterpreter session as the
www-data
user.