Vulnerability Description
A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The manipulation of the argument profile_picture with the input <?php phpinfo();?> leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oretnom23 | Clinic\'S Patient Management System | 2.0 |
Related Weaknesses (CWE)
References
- https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/
- https://vuldb.com/?id.203178ExploitThird Party Advisory
- https://github.com/CyberThoth/CVE/blob/8c6b66919be1bd66a54c16cc27cbdd9793221d3e/
- https://vuldb.com/?id.203178ExploitThird Party Advisory
FAQ
What is CVE-2022-2297?
CVE-2022-2297 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability, which was classified as critical, was found in SourceCodester Clinics Patient Management System 2.0. Affected is an unknown function of the file /pms/update_user.php?user_id=1. The ma...
How severe is CVE-2022-2297?
CVE-2022-2297 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-2297?
Check the references section above for vendor advisories and patch information. Affected products include: Oretnom23 Clinic\'S Patient Management System.