Chamillo LMS 1.11.2 Missing Cache Header
嗯,用户让我帮忙总结一篇文章,控制在100字以内,而且不需要特定的开头。我得先仔细阅读文章内容,找出关键点。 文章讲的是Chamillo LMS 1.11.2版本中的一个漏洞,CVE-2025-69581。问题出在Social Network /personal_data这个端点上,缺少缓存控制头,导致用户登出后还能通过浏览器的返回按钮访问敏感信息。这可能引发隐私泄露、身份盗用等问题。 作者是Rivek Raj Tamang,来自印度锡金邦。漏洞影响的是Chamillo LMS 1.11.2版本,属于信息泄露类型。复现步骤包括登录、访问个人数据、登出,然后用返回按钮查看信息。 我需要把这些关键点浓缩到100字以内。重点包括:产品名称、版本、漏洞类型、问题原因(缺少缓存控制)、影响(敏感信息泄露)、可能的风险(隐私、身份盗用)以及发现者的信息。 确保语言简洁明了,不使用复杂的术语,直接描述问题和影响。 </think> Chamillo LMS 1.11.2 存在缓存控制缺失漏洞,导致用户登出后仍可通过浏览器返回按钮访问敏感个人信息。此漏洞可能导致隐私泄露和身份盗用风险。 2026-1-20 21:51:50 Author: cxsecurity.com(查看原文) 阅读量:1 收藏

Chamillo LMS 1.11.2 Missing Cache Header

# CVE-2025-69581 An issue was discovered in Chamillo LMS 1.11.2. The Social Network /personal_data endpoint exposes full sensitive user information even after logout because proper cache-control is missing. Using the browser back button restores all personal data, allowing unauthorized users on the same device to view confidential information. This leads to profiling, impersonation, targeted attacks, and significant privacy risks. Discovered by - Rivek Raj Tamang (RivuDon), Sikkim, India. <img width="389" height="129" alt="image" src="https://github.com/user-attachments/assets/339dcc08-7c09-4024-9802-84703aa7893a" /> **Affected Product: Chamilo LMS** * Affected Version: 1.11.2 * **Discovered by: Rivek Raj Tamang (RivuDon), Sikkim, India** ## Vulnerability Details Information Disclosure # Summary The vulnerability allows unauthorized access to sensitive user information in Overhang.IO Tutor (tutor-open-edx) version 20.0.2 due to improper client-side session handling and missing cache-control headers. After logging out, user-specific PII remains accessible simply by pressing the browser’s back button, exposing sensitive account details without reauthentication. This flaw constitutes an Information Disclosure vulnerability and poses a risk to user privacy and session integrity. ## Steps to Reproduce 1. Have a valid account 2. Log in to the account 3. Go to Social Network > Personal Data 4. Click on user_info 5. Note all the Sensitive PII Information 6. Now simply click on logout and wait for the page to log out 7. Now click on the browser back button Note all the PII Being disclosed clearly without any proper cache control # Acknowledgement This vulnerability was discovered and responsibly reported by: **Rivek Raj Tamang (RivuDon) from Sikkim, India** https://www.linkedin.com/in/rivektamang/ https://rivudon.medium.com/



 

Thanks for you comment!
Your message is in quarantine 48 hours.

{{ x.nick }}

|

Date:

{{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1


{{ x.comment }}


文章来源: https://cxsecurity.com/issue/WLB-2026010013
如有侵权请联系:admin#unsafe.sh