CVE-2024-30616

8.8 HIGH

📋 TL;DR

Chamilo LMS 1.11.26 has an incorrect access control vulnerability in the profile management component that allows non-admin users to manipulate sensitive profile information. This affects all Chamilo LMS installations running the vulnerable version, potentially compromising user data integrity and privacy.

💻 Affected Systems

Products:
  • Chamilo LMS
Versions: 1.11.26
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Chamilo LMS 1.11.26 specifically; other versions may have different security implementations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify administrator profiles, escalate privileges, alter critical user data, or compromise the entire learning management system's integrity.

🟠

Likely Case

Unauthorized users modifying other users' profile information, potentially changing contact details, passwords, or personal data without permission.

🟢

If Mitigated

With proper access controls and monitoring, unauthorized modifications would be detected and prevented, limiting impact to minor data inconsistencies.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access but minimal technical skill. The vulnerability is in the main/auth/profile endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Fixed in commit a1a1e4df70dc65ae4fc7857135f4d3ee185548e7

Vendor Advisory: https://github.com/chamilo/chamilo-lms/commit/a1a1e4df70dc65ae4fc7857135f4d3ee185548e7

Restart Required: No

Instructions:

1. Update to the latest Chamilo LMS version or apply the specific commit. 2. Replace vulnerable files with patched versions from the official repository. 3. Verify access controls are properly enforced.

🔧 Temporary Workarounds

Restrict profile endpoint access

all

Temporarily restrict access to the vulnerable main/auth/profile endpoint using web server configuration or application firewall rules.

# For Apache: add to .htaccess
<Location "/main/auth/profile">
    Require admin
</Location>
# For Nginx: add to server block
location /main/auth/profile {
    deny all;
}

🧯 If You Can't Patch

  • Implement strict role-based access controls and audit all profile modification activities.
  • Monitor and alert on unauthorized profile changes through logging and SIEM integration.

🔍 How to Verify

Check if Vulnerable:

Check if running Chamilo LMS version 1.11.26 and test if non-admin users can modify other users' profiles through the main/auth/profile endpoint.

Check Version:

Check Chamilo version in the system information panel or review the main/inc/conf/configuration.php file for version details.

Verify Fix Applied:

After patching, verify that non-admin users cannot manipulate sensitive profile information and that proper access controls are enforced.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized profile modification attempts
  • Access to main/auth/profile by non-admin users
  • Unexpected profile data changes

Network Indicators:

  • HTTP POST requests to /main/auth/profile from non-admin accounts
  • Unusual profile update patterns

SIEM Query:

source="chamilo_logs" AND (uri_path="/main/auth/profile" AND user_role!="admin")

🔗 References

📤 Share & Export