CVE-2023-34944
📋 TL;DR
This vulnerability allows attackers to upload malicious SVG files to Chamilo LMS, which can lead to remote code execution. It affects Chamilo 1.11.* versions up to v1.11.18. Attackers can exploit this without authentication to compromise the server.
💻 Affected Systems
- Chamilo LMS
📦 What is this software?
Chamilo Lms by Chamilo
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, or use as a foothold for lateral movement within the network.
Likely Case
Webshell installation allowing persistent access, data exfiltration, or defacement of the Chamilo instance.
If Mitigated
Limited impact if file uploads are disabled or strict file type validation is implemented.
🎯 Exploit Status
Exploitation involves uploading a crafted SVG file containing malicious code. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v1.11.19 and later
Vendor Advisory: https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-113-2023-05-31-Low-impact-Low-risk-XSS-through-SVG
Restart Required: No
Instructions:
1. Backup your Chamilo installation and database. 2. Download the latest version from chamilo.org. 3. Replace the affected files with patched versions. 4. Verify the fix by checking the version.
🔧 Temporary Workarounds
Disable SVG uploads
allModify Chamilo configuration to block SVG file uploads entirely.
Edit Chamilo configuration to remove 'svg' from allowed file types
Implement WAF rules
allAdd web application firewall rules to block malicious SVG uploads.
Add WAF rule: Block requests with 'fileUpload.lib.php' and SVG content
🧯 If You Can't Patch
- Disable the file upload functionality in Chamilo completely.
- Implement strict network segmentation to isolate the Chamilo server from critical assets.
🔍 How to Verify
Check if Vulnerable:
Check if Chamilo version is 1.11.18 or earlier and file upload is enabled.
Check Version:
Check Chamilo admin panel or main configuration file for version number.
Verify Fix Applied:
Verify Chamilo version is 1.11.19 or later and test SVG upload functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual file uploads to /fileUpload.lib.php
- SVG files with suspicious content (e.g., PHP code, JavaScript)
Network Indicators:
- HTTP POST requests to fileUpload.lib.php with SVG files
- Unusual outbound connections from Chamilo server
SIEM Query:
source="web_logs" AND uri="/fileUpload.lib.php" AND file_type="svg"
🔗 References
- http://chamilo.com
- https://github.com/chamilo/chamilo-lms/commit/0d0c88c4806280ac9b70a299d6e3099269c9bc54
- https://github.com/chamilo/chamilo-lms/commit/f6e83550c2d17fc93a65ec4be602a78312289f37
- https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-113-2023-05-31-Low-impact-Low-risk-XSS-through-SVG
- http://chamilo.com
- https://github.com/chamilo/chamilo-lms/commit/0d0c88c4806280ac9b70a299d6e3099269c9bc54
- https://github.com/chamilo/chamilo-lms/commit/f6e83550c2d17fc93a65ec4be602a78312289f37
- https://support.chamilo.org/projects/chamilo-18/wiki/Security_issues#Issue-113-2023-05-31-Low-impact-Low-risk-XSS-through-SVG