CVE-2021-37364
moderate-risk
Published 2021-10-26
OpenClinic GA 5.194.18 is affected by Insecure Permissions. By default the Authenticated Users group has the modify permission to openclinic folders/files. A low privilege account is able to rename mysqld.exe or tomcat8.exe files located in bin folders and replace with a malicious file that would connect back to an attacking computer giving system level privileges (nt authority\system) due to the service running as Local System. While a low privilege user is unable to restart the service through the application, a restart of the computer triggers the execution of the malicious file. The application also have unquoted service path issues.
Do I need to act?
-
0.50% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.8/10
High
LOCAL
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Third Party Advisory
https://sourceforge.net/projects/open-clinic/
Third Party Advisory
https://sourceforge.net/projects/open-clinic/files/latest/download
Third Party Advisory
https://www.exploit-db.com/exploits/50448
Third Party Advisory
https://sourceforge.net/projects/open-clinic/
Third Party Advisory
https://sourceforge.net/projects/open-clinic/files/latest/download
Third Party Advisory
https://www.exploit-db.com/exploits/50448
31
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal