提出 #792092: rickxy Hospital-Management-System 1.0 Unrestricted Upload情報

タイトルrickxy Hospital-Management-System 1.0 Unrestricted Upload
説明A critical arbitrary file upload vulnerability was discovered in the "/backend/admin/his_admin_account.php" file of rickxy Hospital-Management-System v1.0. Unauthenticated attackers can craft a direct profile update POST request and inject a malicious PHP payload (e.g., webshell) instead of an image via the "ad_dpic" parameter. The uploaded shell can then be directly accessed and executed by navigating to the upload directory. This leads to Remote Code Execution (RCE), comprehensive system control, unauthorized database access, and potential server takeover. Exploitation requires no authentication or prior access to the system.
ソース⚠️ https://github.com/freeloader9527/cve/issues/2
ユーザー
 wacool (UID 72886)
送信2026年03月28日 18:28 (23 日 ago)
モデレーション2026年04月19日 16:04 (22 days later)
ステータス承諾済み
VulDBエントリ358237 [rickxy Hospital Management System 迄 88a4290d957dc5bdde8a56e5ad451ad14f7f90f4 his_admin_account.php ad_dpic 特権昇格]
ポイント20

Interested in the pricing of exploits?

See the underground prices here!