Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-34960 PoC — Chamilo 命令注入漏洞

Source
Associated Vulnerability
Title:Chamilo 命令注入漏洞 (CVE-2023-34960)
Description:A command injection vulnerability in the wsConvertPpt component of Chamilo v1.11.* up to v1.11.18 allows attackers to execute arbitrary commands via a SOAP API call with a crafted PowerPoint name.
Description
Perform with Massive Command Injection (Chamilo)
Readme
## CVE-2023-34960
- Mass unauthenticated command injection (Chamilo)
## Screenshot
![chamilo](https://github.com/Pari-Malam/CVE-2023-34960/assets/25004320/e0ddfa33-2fa0-432f-b2e3-8b012325dd1a)
## Requirements
- Python3.7+
## Supported Os
- Linuxer
- Wingays
## Get start with
```
$ git clone https://github.com/Pari-Malam/CVE-2023-34960
$ cd CVE-2023-34960
$ pip/pip3 install -r requirements.txt
$ python/python3 exploit.py
```
## Footprints Notes
- By using this tool, you agree that you are using it for educational purposes only and that you will not use it for any illegal activity. You also agree to bear all risks associated with the use of this tool. I will not be responsible for direct or indirect damage caused by the use of this tool. Don't suyyyyyyyyyyyyyyyyyyyy me!
## Author
- Pari Malam
## Contacts
[![Telegram](https://img.shields.io/badge/-Telegram-blue)](https://telegram.me/SurpriseMTFK)
[![Discord](https://img.shields.io/badge/-Discord-purple)](https://discordapp.com/users/829404192585678858)
File Snapshot

[4.0K] /data/pocs/1cf0a8e9db6fb8acbbc6cfa09079cc37c402a153 ├── [8.6K] exploit.py ├── [4.0K] lib │   └── [390K] ua.txt ├── [1015] README.md └── [ 27] requirements.txt 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →