CVE-2021-47758

8.8 HIGH

📋 TL;DR

CVE-2021-47758 allows authenticated attackers to upload malicious PHP plugins through Chikitsa Patient Management System's module upload functionality, enabling remote code execution on the server. This affects all organizations using Chikitsa 2.0.2 for patient management, potentially exposing sensitive medical data and system control.

💻 Affected Systems

Products:
  • Chikitsa Patient Management System
Versions: 2.0.2
Operating Systems: Linux, Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; default installations are vulnerable without additional configuration changes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise leading to data exfiltration of sensitive patient records, ransomware deployment, or use as a pivot point for network attacks.

🟠

Likely Case

Unauthorized access to patient data, installation of backdoors, and potential compliance violations under healthcare regulations.

🟢

If Mitigated

Limited impact with proper file upload restrictions and network segmentation, though authentication bypass could still pose risks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires authenticated access; public exploit code is available in Exploit-DB (ID 50571).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.0.3 or later

Vendor Advisory: https://www.chikitsa.io/

Restart Required: No

Instructions:

1. Backup your database and application files. 2. Download the latest version from the official website. 3. Replace the existing installation files with the updated version. 4. Verify module upload functionality is properly restricted.

🔧 Temporary Workarounds

Disable Module Upload

all

Temporarily disable the module upload functionality in Chikitsa configuration.

Edit configuration file to remove or comment out module upload settings

File Upload Restrictions

linux

Configure web server to block PHP file uploads through ZIP extraction.

Add .htaccess rule: <FilesMatch "\.(php|php5|php7|phtml)$">
    Deny from all
</FilesMatch>

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Chikitsa server from critical systems
  • Deploy web application firewall (WAF) with rules to block malicious file uploads and PHP execution attempts

🔍 How to Verify

Check if Vulnerable:

Check if running Chikitsa version 2.0.2 and test if authenticated users can upload ZIP files containing PHP scripts through module upload.

Check Version:

Check Chikitsa admin panel or version file in installation directory

Verify Fix Applied:

Verify version is 2.0.3 or later and test that PHP file uploads through ZIP archives are properly blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to module directory
  • PHP file creation in upload directories
  • Multiple failed upload attempts

Network Indicators:

  • HTTP POST requests to upload endpoints with ZIP files
  • Subsequent connections to uploaded PHP files

SIEM Query:

source="web_server" AND (uri="/module/upload" OR uri LIKE "%.php") AND method="POST"

🔗 References

📤 Share & Export