A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The manipulation of the argument profile_picture with the input <?php phpinfo();?> leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
References
Configurations
History
21 Nov 2024, 07:00
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/CVE/Clinic%27s%20Patient%20Management%20System/Unrestricted%20file%20upload%20%28RCE%29/POC.md - | |
References | () https://vuldb.com/?id.203178 - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 6.3 |
07 Sep 2024, 12:56
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oretnom23:clinic\'s_patient_management_system:2.0:*:*:*:*:*:*:* | |
First Time |
Oretnom23 clinic\'s Patient Management System
Oretnom23 |
07 Nov 2023, 03:46
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2022-07-12 17:15
Updated : 2024-11-21 07:00
NVD link : CVE-2022-2297
Mitre link : CVE-2022-2297
CVE.ORG link : CVE-2022-2297
JSON object : View
Products Affected
oretnom23
- clinic\'s_patient_management_system
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type