|
58136 | 58136 | "https" |
58137 | 58137 | ], |
58138 | 58138 | "targets": null, |
58139 | | - "mod_time": "2024-11-04 16:58:32 +0000", |
| 58139 | + "mod_time": "2024-12-17 14:27:41 +0000", |
58140 | 58140 | "path": "/modules/auxiliary/scanner/teamcity/teamcity_login.rb", |
58141 | 58141 | "is_install_path": true, |
58142 | 58142 | "ref_name": "scanner/teamcity/teamcity_login", |
@@ -102724,6 +102724,68 @@ |
102724 | 102724 | "session_types": false, |
102725 | 102725 | "needs_cleanup": true |
102726 | 102726 | }, |
| 102727 | + "exploit_multi/http/clinic_pms_fileupload_rce": { |
| 102728 | + "name": "Clinic's Patient Management System 1.0 - Unauthenticated RCE", |
| 102729 | + "fullname": "exploit/multi/http/clinic_pms_fileupload_rce", |
| 102730 | + "aliases": [ |
| 102731 | + |
| 102732 | + ], |
| 102733 | + "rank": 600, |
| 102734 | + "disclosure_date": "2022-10-31", |
| 102735 | + "type": "exploit", |
| 102736 | + "author": [ |
| 102737 | + "Aaryan Golatkar", |
| 102738 | + "Oğulcan Hami Gül" |
| 102739 | + ], |
| 102740 | + "description": "This module exploits an unauthenticated file upload vulnerability in Clinic's\n Patient Management System 1.0. An attacker can upload a PHP web shell and execute\n it by leveraging directory listing enabled on the `/pms/user_images` directory.", |
| 102741 | + "references": [ |
| 102742 | + "EDB-51779", |
| 102743 | + "CVE-2022-40471", |
| 102744 | + "URL-https://www.cve.org/CVERecord?id=CVE-2022-40471", |
| 102745 | + "URL-https://drive.google.com/file/d/1m-wTfOL5gY3huaSEM3YPSf98qIrkl-TW/view" |
| 102746 | + ], |
| 102747 | + "platform": "PHP", |
| 102748 | + "arch": "php", |
| 102749 | + "rport": 80, |
| 102750 | + "autofilter_ports": [ |
| 102751 | + 80, |
| 102752 | + 8080, |
| 102753 | + 443, |
| 102754 | + 8000, |
| 102755 | + 8888, |
| 102756 | + 8880, |
| 102757 | + 8008, |
| 102758 | + 3000, |
| 102759 | + 8443 |
| 102760 | + ], |
| 102761 | + "autofilter_services": [ |
| 102762 | + "http", |
| 102763 | + "https" |
| 102764 | + ], |
| 102765 | + "targets": [ |
| 102766 | + "Clinic Patient Management System 1.0" |
| 102767 | + ], |
| 102768 | + "mod_time": "2024-12-17 21:39:30 +0000", |
| 102769 | + "path": "/modules/exploits/multi/http/clinic_pms_fileupload_rce.rb", |
| 102770 | + "is_install_path": true, |
| 102771 | + "ref_name": "multi/http/clinic_pms_fileupload_rce", |
| 102772 | + "check": true, |
| 102773 | + "post_auth": false, |
| 102774 | + "default_credential": false, |
| 102775 | + "notes": { |
| 102776 | + "Stability": [ |
| 102777 | + "crash-safe" |
| 102778 | + ], |
| 102779 | + "Reliability": [ |
| 102780 | + "repeatable-session" |
| 102781 | + ], |
| 102782 | + "SideEffects": [ |
| 102783 | + "artifacts-on-disk" |
| 102784 | + ] |
| 102785 | + }, |
| 102786 | + "session_types": false, |
| 102787 | + "needs_cleanup": true |
| 102788 | + }, |
102727 | 102789 | "exploit_multi/http/clipbucket_fileupload_exec": { |
102728 | 102790 | "name": "ClipBucket beats_uploader Unauthenticated Arbitrary File Upload", |
102729 | 102791 | "fullname": "exploit/multi/http/clipbucket_fileupload_exec", |
|
0 commit comments