CVE-2021-43484

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary code on Simple Client Management System 1.0 servers by uploading malicious files through create.php. Any organization using this software without proper file extension validation is affected.

💻 Affected Systems

Products:
  • Simple Client Management System
Versions: 1.0
Operating Systems: Any OS running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of version 1.0; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Webshell installation allowing unauthorized access, data exfiltration, and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation and file upload restrictions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit code is publicly available and requires minimal technical skill to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch exists. Consider migrating to alternative software or implementing workarounds.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement server-side validation to restrict file uploads to specific extensions

Modify create.php to validate file extensions before processing

Web Application Firewall Rule

all

Block requests to create.php with suspicious file extensions

WAF rule: Block POST requests to */create.php containing .php, .phtml, .phar extensions

🧯 If You Can't Patch

  • Remove or disable create.php functionality entirely
  • Implement strict network segmentation to isolate the vulnerable system

🔍 How to Verify

Check if Vulnerable:

Check if Simple Client Management System version 1.0 is installed and create.php exists without file extension validation

Check Version:

Check application files for version information or review installation documentation

Verify Fix Applied:

Test file upload functionality with malicious extensions to confirm they are rejected

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed/successful file upload attempts to create.php
  • Unusual POST requests to create.php with executable extensions

Network Indicators:

  • HTTP POST requests to create.php with .php/.phtml files
  • Outbound connections from web server to unknown IPs

SIEM Query:

source="web_logs" AND uri="*/create.php" AND (file_extension="php" OR file_extension="phtml")

🔗 References

📤 Share & Export