CVE-2020-37009
Authenticated Remote Code Execution in MedDream PACS Server Upload Endpoint
Publication date: 2026-01-29
Last updated on: 2026-01-29
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| meddream | meddream_pacs_server | 6.8.3.751 |
| meddream | meddream_pacs_server | 6.8.3.1.751 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-434 | The product allows the upload or transfer of dangerous file types that are automatically processed within its environment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2020-37009 is an authenticated remote code execution vulnerability in MedDream PACS Server version 6.8.3.751. Authenticated users can exploit the uploadImage.php endpoint to upload malicious PHP files, such as a PHP shell, which allows them to execute arbitrary system commands with elevated privileges on the server. This occurs due to improper validation of uploaded files and insufficient access controls, enabling attackers to gain system-level access. [1, 2]
How can this vulnerability impact me? :
This vulnerability can allow an authenticated attacker to execute arbitrary system commands on the MedDream PACS Server with elevated privileges. This can lead to full system compromise, unauthorized access to sensitive medical images and data, disruption of service, and potential further attacks within the network. The attacker could gain system-level access, potentially compromising confidentiality, integrity, and availability of the system. [1, 2]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking for unauthorized or suspicious PHP files uploaded via the uploadImage.php endpoint after authenticating. One approach is to monitor HTTP POST requests to uploadImage.php and look for PHP payloads. Additionally, you can attempt to authenticate and upload a test PHP shell to verify if the upload is possible. Commands to detect exploitation attempts include using curl or wget to simulate the upload and then accessing the uploaded PHP shell with commands like `curl http://target/uploaded_shell.php?cmd=whoami` to check for command execution. Monitoring web server logs for POST requests to uploadImage.php and subsequent GET requests to suspicious PHP files can also help detect exploitation. [2]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include upgrading the MedDream PACS Server to a fixed version released after May 4, 2020 (version 6.8.3.1.751 or later) that patches this vulnerability. Additionally, restrict authenticated user permissions to prevent uploading executable files, implement strict validation and filtering of uploaded files to disallow PHP or other executable scripts, and monitor for suspicious upload activity. If upgrading immediately is not possible, consider disabling the uploadImage.php endpoint or restricting access to it to trusted users only. [2]