CVE-2020-37009
Published: 29 January 2026
Description
MedDream PACS Server 6.8.3.751 contains an authenticated remote code execution vulnerability that allows authorized users to upload malicious PHP files. Attackers can exploit the uploadImage.php endpoint by authenticating and uploading a PHP shell to execute arbitrary system commands with elevated…
more
privileges.
Mitigating Controls (NIST 800-53 r5)AI
Directly counters insufficient validation of uploaded files by requiring checks to block malicious PHP shells at the uploadImage.php endpoint.
Mandates timely remediation and patching of the specific flaw in MedDream PACS Server version 6.8.3.751 to prevent authenticated RCE exploitation.
Deploys malicious code protection mechanisms to scan and block uploaded PHP shells before they can be executed with elevated privileges.
Security SummaryAI
CVE-2020-37009 is an authenticated remote code execution vulnerability in MedDream PACS Server version 6.8.3.751. The flaw resides in the uploadImage.php endpoint, which allows authorized users to upload malicious PHP files, such as a PHP shell, due to insufficient validation of uploaded files. This issue is classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) and carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting high severity.
Attackers with low-privilege authenticated access can exploit the vulnerability remotely over the network with low complexity and no user interaction required. By authenticating to the server and uploading a malicious PHP file via the uploadImage.php endpoint, they can achieve remote code execution, enabling arbitrary system commands to be run with elevated privileges. This grants high impacts on confidentiality, integrity, and availability, potentially leading to full server compromise.
Advisories and references, including a VulnCheck advisory on MedDream PACS Server remote code execution, Exploit-DB entries (ID 48853) with proof-of-concept exploits, and the MedDream product page, provide further technical details. Security practitioners should review these sources for exploitation vectors and verify vendor guidance on patches or mitigations, as no specific remediation details are outlined in the core vulnerability description.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows authenticated RCE via unrestricted upload of malicious PHP files (web shell) to a public-facing web application (uploadImage.php endpoint), directly mapping to T1190 (Exploit Public-Facing Application) and facilitating T1505.003 (Web Shell deployment for command execution).