CVE-2023-33480

HIGH

RemoteClinic 2.0 - Privilege Escalation

Title source: llm
STIX 2.1

Description

RemoteClinic 2.0 contains a critical vulnerability chain that can be exploited by a remote attacker with low-privileged user credentials to create admin users, escalate privileges, and execute arbitrary code on the target system via a PHP shell. The vulnerabilities are caused by a lack of input validation and access control in the staff/register.php endpoint and the edit-my-profile.php page. By sending a series of specially crafted requests to the RemoteClinic application, an attacker can create admin users with more privileges than their own, upload a PHP file containing arbitrary code, and execute arbitrary commands via the PHP shell.

References (1)

Core 1
Core References
Exploit, Issue Tracking, Vendor Advisory
https://github.com/remoteclinic/RemoteClinic/issues/24

Scores

CVSS v3 8.8
EPSS 0.0940
EPSS Percentile 92.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-434
Status published
Products (1)
remoteclinic/remote_clinic 2.0
Published Nov 07, 2023
Tracked Since Feb 18, 2026