SourceCodester Clinics Patient Management System 2.0 update_user.php profile_picture unrestricted upload

A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The manipulation of the argument profile_picture with the input <?php phpinfo();?> leads to unrestricted upload. Using CWE to declare the problem leads to CWE-434. The weakness was presented 07/04/2022. The advisory is available at github.com. This vulnerability is traded as CVE-2022-2297. It is possible to launch the attack remotely. Technical details are available. Furthermore, there is an exploit available. The exploit has been disclosed to the public and may be used. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment. This vulnerability is assigned to T1608.002 by the MITRE ATT&CK project. It is declared as proof-of-concept. The exploit is shared for download at github.com. As 0-day the estimated underground price was around $0-$5k. A possible mitigation has been published even before and not after the disclosure of the vulnerability.

Timeline

The analysis of the timeline helps to identify the required approach and handling of single vulnerabilities and vulnerability collections. This overview makes it possible to see less important slices and more severe hotspots at a glance. Initiating immediate vulnerability response and prioritizing of issues is possible.

User

150

Field

vulnerability_cvss3_meta_tempscore2
vulnerability_cvss3_meta_basescore2
software_type2
vulnerability_cvss3_cna_basescore1
vulnerability_cvss3_nvd_basescore1

Commit Conf

90%36
70%25
50%11
100%3

Approve Conf

90%36
70%25
80%11
100%3
IDCommitedUserFieldChangeRemarksAcceptedStatusC
1272833907/18/2022VulD...cvss3_cna_basescore6.3see CVSS documentation07/18/2022accepted
90
1272833807/18/2022VulD...cvss3_nvd_basescore8.8nist.gov07/18/2022accepted
90
1272833707/18/2022VulD...cvss2_nvd_basescore6.5nist.gov07/18/2022accepted
90
1272833607/18/2022VulD...cvss3_meta_tempscore6.9see CVSS documentation07/18/2022accepted
90
1272833507/18/2022VulD...cvss3_meta_basescore7.1see CVSS documentation07/18/2022accepted
90
1272833407/18/2022VulD...cve_cnaVulDBnvd.nist.gov07/18/2022accepted
70
1272833307/18/2022VulD...cvss3_cna_aLnvd.nist.gov07/18/2022accepted
70
1272833207/18/2022VulD...cvss3_cna_iLnvd.nist.gov07/18/2022accepted
70
1272833107/18/2022VulD...cvss3_cna_cLnvd.nist.gov07/18/2022accepted
70
1272833007/18/2022VulD...cvss3_cna_sUnvd.nist.gov07/18/2022accepted
70
1272832907/18/2022VulD...cvss3_cna_uiNnvd.nist.gov07/18/2022accepted
70
1272832807/18/2022VulD...cvss3_cna_prLnvd.nist.gov07/18/2022accepted
70
1272832707/18/2022VulD...cvss3_cna_acLnvd.nist.gov07/18/2022accepted
70
1272832607/18/2022VulD...cvss3_cna_avNnvd.nist.gov07/18/2022accepted
70
1272832507/18/2022VulD...cvss2_nvd_aiPnvd.nist.gov07/18/2022accepted
70
1272832407/18/2022VulD...cvss2_nvd_iiPnvd.nist.gov07/18/2022accepted
70
1272832307/18/2022VulD...cvss2_nvd_ciPnvd.nist.gov07/18/2022accepted
70
1272832207/18/2022VulD...cvss2_nvd_auSnvd.nist.gov07/18/2022accepted
70
1272832107/18/2022VulD...cvss2_nvd_acLnvd.nist.gov07/18/2022accepted
70
1272832007/18/2022VulD...cvss2_nvd_avNnvd.nist.gov07/18/2022accepted
70

55 more entries are not shown

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!