## https://sploitus.com/exploit?id=34399AFA-2117-5F2F-96E8-9B84AE07D37A
## CVE-2023-34960
<div align="center">
<img src="https://github.com/Mantodkaz/CVE-2023-34960/blob/4783a3465ac5fa8672ee9a1c8db3580204766f6a/img/chamilo.PNG" width="550px" />
</div>
### Chamilo Command Injection
with auto upload shell. <br>(use ur logic) check path directory at your result vuln, then you can find your access shells `wso.php`<br>
## To Install & Execute
```
$ git clone https://github.com/Mantodkaz/CVE-2023-34960
$ cd CVE-2023-34960
$ pip install -r requirements.txt
$ python3 finder.py
```
#### Note
for more command you can self edit Point [Line 66](https://github.com/Mantodkaz/CVE-2023-34960/blob/a72b8f2ac6de06f2a89ff7bbe39061d4f593cff2/finder.py#L66) of `finder.py`
## Author
- MantodKaz
#### DISCAIMER !!
``I will not be held responsible for any direct or indirect damages caused by using this tool. use it only for educational purposes and you will not use it for any illegal activity.``
## reference
[Aituglo](https://github.com/Aituglo/CVE-2023-34960)