{"id":"CVE-2023-3545","details":"Improper sanitisation in `main/inc/lib/fileUpload.lib.php` in Chamilo LMS \u003c= v1.11.20 on Windows and Apache installations allows unauthenticated attackers to bypass file upload security protections and obtain remote code execution via uploading of `.htaccess` file. This vulnerability may be exploited by privileged attackers or chained with unauthenticated arbitrary file write vulnerabilities, such as CVE-2023-3533, to achieve remote code execution.","modified":"2026-02-24T01:24:37.994557Z","published":"2023-11-28T07:15:42.913Z","references":[{"type":"ADVISORY","url":"https://starlabs.sg/advisories/23/23-3545/"},{"type":"ADVISORY","url":"https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-125-2023-07-13-Critical-impact-Moderate-risk-Htaccess-File-Upload-Security-Bypass-on-Windows-CVE-2023-3545"},{"type":"REPORT","url":"https://support.chamilo.org/projects/chamilo-18/wiki/security_issues#Issue-125-2023-07-13-Critical-impact-Moderate-risk-Htaccess-File-Upload-Security-Bypass-on-Windows-CVE-2023-3545"},{"type":"FIX","url":"https://github.com/chamilo/chamilo-lms/commit/dc7bfce429fbd843a95a57c184b6992c4d709549"},{"type":"EVIDENCE","url":"https://starlabs.sg/advisories/23/23-3545/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/chamilo/chamilo-lms","events":[{"introduced":"0"},{"last_affected":"60c78cb7c7a9ba1bd7e0269be0cec31c3e5b2494"}]}],"versions":["1.10.x.pre-doctrine","CHAMILO_1_10_DEV_ICPNA_20130114","CHAMILO_1_8_6_2_BETA_1","CHAMILO_1_8_6_2_STABLE","CHAMILO_1_8_6_2_STABLE_BIS","CHAMILO_1_8_6_2_STABLE_CUATER","CHAMILO_1_8_6_2_STABLE_TRIS","CHAMILO_1_8_7_1_STABLE_1","CHAMILO_1_8_7_1_STABLE_2","CHAMILO_1_8_7_ALPHA_1","CHAMILO_1_8_7_ALPHA_2","CHAMILO_1_8_7_BETA_1","CHAMILO_1_8_7_RC2","CHAMILO_1_8_7_RC_1","CHAMILO_1_8_7_STABLE","CHAMILO_1_8_7_STABLE_BIS","CHAMILO_1_8_8.3_STABLE_4","CHAMILO_1_8_8_2_RC_1","CHAMILO_1_8_8_2_STABLE","CHAMILO_1_8_8_2_STABLE_2","CHAMILO_1_8_8_2_STABLE_3","CHAMILO_1_8_8_4_BETA_1","CHAMILO_1_8_8_4_STABLE","CHAMILO_1_8_8_ALPHA","CHAMILO_1_8_8_BETA_1","CHAMILO_1_8_8_BETA_2","CHAMILO_1_8_8_BETA_3","CHAMILO_1_8_8_STABLE_1","CHAMILO_1_9_0_ALPHA_1","CHAMILO_1_9_0_ALPHA_2","CHAMILO_1_9_0_ALPHA_3","CHAMILO_1_9_0_ALPHA_4","CHAMILO_1_9_0_ALPHA_5","CHAMILO_1_9_0_ALPHA_6","CHAMILO_1_9_0_ALPHA_7","CHAMILO_1_9_0_PRE_ALPHA","CHAMILO_1_9_0_RC_1","CHAMILO_1_9_0_STABLE","CHAMILO_1_9_0_STABLE_2","CHAMILO_1_9_0_STABLE_3","CHAMILO_1_9_2_STABLE","CHAMILO_1_9_2_STABLE_BIS","CHAMILO_1_9_2_STABLE_QUARTER","CHAMILO_1_9_2_STABLE_TRIS","CHAMILO_1_9_4_ALPHA_1","CHAMILO_1_9_4_RC_1","CHAMILO_1_9_4_STABLE","CHAMILO_1_9_6_RC_1","CHAMILO_1_9_6_RC_2","CHAMILO_1_9_6_STABLE","v1.10.6-softaculous","v1.10.6-stable","v1.11.10","v1.11.12","v1.11.12-beta.1","v1.11.14","v1.11.14-beta.1","v1.11.18","v1.11.20","v1.11.20-beta.1","v1.11.6","v1.11.6-alpha.1","v1.11.8","v1.8.6.1","v1.9.10","v1.9.10.2","v1.9.8","v1.9.8.1","v1.9.8.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-3545.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}