CVE-2025-7477

4.7 MEDIUM

📋 TL;DR

This critical vulnerability in Simple Car Rental System 1.0 allows remote attackers to upload arbitrary files via the image parameter in /admin/add_cars.php. This can lead to remote code execution or system compromise. All installations of Simple Car Rental System 1.0 with the admin interface exposed are affected.

💻 Affected Systems

Products:
  • Simple Car Rental System
Versions: 1.0
Operating Systems: All platforms running PHP
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation; requires admin interface access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system takeover, data theft, or ransomware deployment

🟠

Likely Case

Webshell upload enabling persistent backdoor access and further system exploitation

🟢

If Mitigated

File upload blocked or restricted to safe extensions only

🌐 Internet-Facing: HIGH - Attack can be initiated remotely without authentication
🏢 Internal Only: MEDIUM - Still vulnerable but requires internal network access

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires admin access; public disclosure increases weaponization risk

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://code-projects.org/

Restart Required: No

Instructions:

No official patch available. Consider workarounds or alternative software.

🔧 Temporary Workarounds

File Upload Restriction

all

Implement server-side validation to restrict uploaded files to specific safe extensions

# Modify /admin/add_cars.php to validate file extensions
# Example: if(!in_array($ext, ['jpg','png','gif'])) { die('Invalid file type'); }

Admin Interface Protection

all

Restrict access to /admin/ directory using .htaccess or web server configuration

# Apache .htaccess: AuthType Basic\nAuthName "Admin Area"\nAuthUserFile /path/to/.htpasswd\nRequire valid-user
# Nginx: location /admin/ { auth_basic "Admin Area"; auth_basic_user_file /path/to/.htpasswd; }

🧯 If You Can't Patch

  • Remove or disable the /admin/add_cars.php file entirely
  • Implement web application firewall (WAF) rules to block file uploads to vulnerable endpoint

🔍 How to Verify

Check if Vulnerable:

Check if /admin/add_cars.php exists and accepts file uploads without proper validation

Check Version:

# Check version in system files or database: grep -r "version" /path/to/car-rental-system/

Verify Fix Applied:

Attempt to upload a non-image file (e.g., .php, .exe) and verify it's rejected

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to /admin/add_cars.php
  • Uploads of non-image file types
  • Multiple failed upload attempts

Network Indicators:

  • POST requests to /admin/add_cars.php with file uploads
  • Unusual outbound connections from web server

SIEM Query:

source="web_logs" AND uri="/admin/add_cars.php" AND method="POST" AND content_type="multipart/form-data"

🔗 References

📤 Share & Export