CVE-2021-45003

9.8 CRITICAL

📋 TL;DR

Laundry Booking Management System 1.0 and previous versions contain a remote code execution vulnerability in profile.php via the 'image' parameter. Attackers can upload malicious files to execute arbitrary code on the server, potentially gaining full system control. All users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Laundry Booking Management System
Versions: 1.0 and all previous versions
Operating Systems: Any OS running PHP web server
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations with profile.php accessible and file upload functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary commands, steal data, install persistent backdoors, pivot to other systems, and potentially destroy the entire system.

🟠

Likely Case

Attackers upload webshells to gain unauthorized access, modify or steal sensitive customer data, disrupt laundry booking operations, and potentially use the system as a foothold for further attacks.

🟢

If Mitigated

With proper input validation and file upload restrictions, the vulnerability would be prevented, maintaining normal system functionality with no security impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but is straightforward once authenticated. Public proof-of-concept code is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Consider replacing with alternative software or implementing custom security fixes.

🔧 Temporary Workarounds

Input Validation and File Type Restriction

all

Implement strict validation of uploaded files to only allow specific image types and verify file contents.

Modify profile.php to add: $allowed_types = ['image/jpeg', 'image/png', 'image/gif']; if(!in_array($_FILES['image']['type'], $allowed_types)) { die('Invalid file type'); }

File Upload Directory Isolation

linux

Move uploaded files outside web root or restrict execution in upload directories.

chmod 644 /path/to/uploads/*
Add to .htaccess: php_flag engine off
Add to nginx config: location ~* \.php$ { deny all; }

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious file uploads and RCE attempts.
  • Isolate the system in a segmented network with strict outbound traffic controls.

🔍 How to Verify

Check if Vulnerable:

Check if profile.php exists and accepts file uploads without proper validation. Test by attempting to upload a PHP file through the image parameter.

Check Version:

Check system documentation or admin panel for version information. No standard command available.

Verify Fix Applied:

Attempt to upload a PHP file through the image parameter; successful upload should be blocked with proper error message.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to profile.php
  • PHP file uploads in image upload directories
  • Webshell access patterns in access logs
  • System command execution from web user context

Network Indicators:

  • Unusual outbound connections from web server
  • Traffic to known webshell paths
  • POST requests with PHP file uploads to profile.php

SIEM Query:

source="web_logs" AND (uri="/profile.php" AND method="POST" AND file_extension="php") OR (process="php" AND parent_process="apache" OR parent_process="nginx")

🔗 References

📤 Share & Export