You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: documentation/modules/exploit/multi/http/clinic_pms_sqli_to_rce.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,6 @@
1
1
## Vulnerable Application
2
-
Clinic Patient's Management System contains SQL injection vulnerability in login section. This module uses the vulnerability (CVE-2025-3096) to gain unauthorized access to the application. As lateral movement, it uses another vulnerability (CVE-2022-2297) to gain remote code execution.
2
+
Clinic Patient's Management System contains SQL injection vulnerability in login section. This module uses the vulnerability
3
+
(CVE-2025-3096) to gain unauthorized access to the application. As lateral movement, it uses another vulnerability (CVE-2022-2297) to gain remote code execution.
Copy file name to clipboardExpand all lines: modules/exploits/multi/http/clinic_pms_sqli_to_rce.rb
+10-8Lines changed: 10 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -10,6 +10,7 @@ class MetasploitModule < Msf::Exploit::Remote
10
10
includeMsf::Exploit::FileDropper
11
11
includeMsf::Post::File
12
12
includeMsf::Auxiliary::Report
13
+
prependMsf::Exploit::Remote::AutoCheck
13
14
14
15
definitialize(info={})
15
16
super(
@@ -20,7 +21,8 @@ def initialize(info = {})
20
21
This module exploits an SQL injection in login portal, which allows to log in as admin. Next, it allows the attacker to upload malicious files through user modification to achieve RCE.
fail_withFailure::UnexpectedReply,'Failed to update user when attempting to exploit'unlessres.headers['Location'] == 'congratulation.php?goto_page=users.php&message=user update successfully'
0 commit comments