We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2023-33480



Assignermitre
Reserved2023-05-22
Published2023-11-07
Updated2024-09-05

Description

RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell.

References

https://github.com/remoteclinic/RemoteClinic/issues/24

cve.org CVE-2023-33480

nvd.nist.gov CVE-2023-33480

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2023-33480
Subscribe to our newsletter to learn more about our work.