Path: blob/master/documentation/modules/exploit/linux/http/chamilo_bigupload_webshell.md
27549 views
Vulnerable Application
Chamilo LMS is a free software e-learning and content management system. In versions prior to <= v1.11.24 a webshell can be uploaded via the bigload.php endpoint. If the GET request parameter action is set to post-unsupported file extension checks are skipped allowing for attacker controlled .php files to be uploaded to: /main/inc/lib/javascript/bigupload/files/ if the /files/ directory already exists - it does not exist by default.
Setup
A vulnerable docker-compose configuration can be found at the following link: https://github.com/vulhub/vulhub/pull/559
Clone the repo
git clone https://github.com/vulhub/vulhub.gitCheckout the pull request mentioned above:
git checkout CVE-2023-4220Run
cd vulhub/chamilo/CVE-2023-4220Start the environment:
docker compose upNavigate to
http://127.0.0.1:8080to complete the installation wizard.Note when filling out the database IP address and credentials - the DB hostname is the name of the container which is
mariadb(notlocalhostor127.0.0.1).Once the installation wizard is complete the target should be ready to be exploited with the module. This container has the non-default
/files/directory created already.
Verification Steps
Start msfconsole
Do:
use linux/http/chamilo_bigupload_webshellSet the
RHOST,RPORT, andLHSOToptionsRun the module
Receive a Meterpreter session as the
www-datauser.