Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-33480

EPSS 9.40% · P93
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-33480

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Saad Irfan RemoteClinic 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Saad Irfan RemoteClinic是Saad Irfan开源的一个应用程序。提供通过Web远程管理您的诊所功能。 RemoteClinic 2.0版本存在安全漏洞,该漏洞源于staff/register.php端点和edit-my-profile.php页面缺乏输入验证和访问控制,导致攻击者可以创建高权限管理员用户,上传包含任意代码的PHP文件,并执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2023-33480

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-33480

登录查看更多情报信息。

Same Patch Batch · n/a · 2023-11-07 · 22 CVEs total

CVE-2023-41547.5 HIGHSamba: ad dc password exposure to privileged users and rodcs
CVE-2023-43984PrestaShop Advanced Export Products Orders Cron CSV Excel 安全漏洞
CVE-2023-47456Tenda AX1806 安全漏洞
CVE-2023-47455Tenda AX1806 安全漏洞
CVE-2023-47360VideoLAN VLC media player 安全漏洞
CVE-2023-47359VideoLAN VLC media player 安全漏洞
CVE-2023-47102UrBackup 安全漏洞
CVE-2023-46998BootBox Bootbox.js 安全漏洞
CVE-2023-46501BoltWire 安全漏洞
CVE-2023-46001GPAC 安全漏洞
CVE-2023-45380PrestaShop Order Duplicator 安全漏洞
CVE-2021-43419Opay Mobile application 安全漏洞
CVE-2023-43886Tenda RX9 Pro 安全漏洞
CVE-2023-43885Tenda RX9 Pro 安全漏洞
CVE-2023-42361Atlassian JIRA Server和JIRA Data Center 安全漏洞
CVE-2023-42284Tyk Gateway 安全漏洞
CVE-2023-42283Tyk Gateway 安全漏洞
CVE-2023-41425WonderCMS 安全漏洞
CVE-2023-33481Saad Irfan RemoteClinic 安全漏洞
CVE-2023-33479Saad Irfan RemoteClinic 安全漏洞

Showing top 20 of 22 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2023-33480

No comments yet


Leave a comment