Vulnerability Details : CVE-2023-31498
Potential exploit
A privilege escalation issue was found in PHP Gurukul Hospital Management System In v.4.0 allows a remote attacker to execute arbitrary code and access sensitive information via the session token parameter.
Vulnerability category: Execute codeGain privilege
Products affected by CVE-2023-31498
- cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-31498
5.00%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-31498
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 2025-01-27 |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2023-31498
-
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2023-31498
-
https://twitter.com/captain__noob
Roshan Cheriyan (@captain__noob) / TwitterNot Applicable
-
https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832
Session hijacking leading to privilege escalation · GitHubExploit;Mitigation;Third Party Advisory
-
https://github.com/captain-noob
captain-noob (Roshan Cheriyan) · GitHubNot Applicable
Jump to