Vulnerability Details : CVE-2022-36667
Garage Management System 1.0 is vulnerable to the Remote Code Execution (RCE) due to the lack of filtering from the file upload function. The vulnerability exist during adding parts and from the upload function, the attacker can upload PHP Reverse Shell straight away to gain RCE.
Vulnerability category: Execute code
Products affected by CVE-2022-36667
- cpe:2.3:a:garage_management_system_project:garage_management_system:1.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-36667
1.54%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-36667
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
CWE ids for CVE-2022-36667
-
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2022-36667
-
https://github.com/saitamang/POC-DUMP/blob/main/Garage%20Management%20System/README.md
POC-DUMP/README.md at main · saitamang/POC-DUMP · GitHubExploit;Third Party Advisory
-
https://www.sourcecodester.com/php/15485/garage-management-system-using-phpmysql-source-code.html
Garage Management System using PHP/MySQL Free Source Code | Free Source Code Projects and TutorialsProduct
Jump to