Description
NOSH 4a5cfdb allows remote authenticated users to execute PHP arbitrary code via the "practice logo" upload feature. The client-side checks can be bypassed. This may allow attackers to steal Protected Health Information because the product is for health charting.
References
https://gist.github.com/abbisQQ/d8392acf7e02003e73af973cc9f5f54a
https://github.com/shihjay2/docker-nosh
https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533
https://gist.github.com/abbisQQ/d8392acf7e02003e73af973cc9f5f54a
https://github.com/shihjay2/docker-nosh
https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 · High
Information
Source identifier
Vulnerability status
Modified
Published
2023-02-01T13:15:09.933Z
3 years agoLast modified
2025-03-27T14:15:45.970Z
11 months ago