How Hackers Took Full Control of a Hospital Network
In 2020, a ransomware group gained initial access to a US hospital network through a simple file upload vulnerability on an internet-facing web application. They uploaded a webshell — a malicious script disguised as an image — through a form that accepted profile pictures. From that foothold, they moved laterally through the network, deployed ransomware across hundreds of machines, and demanded $1.3 million. The hospital had to divert patients and operate on paper records for weeks.
File upload vulnerabilities are particularly dangerous because they do not just expose data — they give attackers execution capability on the server. That is a completely different category of impact.
Why "profile picture" fields get targeted
File upload features are everywhere and developers often focus on the happy path — they think about what happens when a user uploads a valid image. They do not always think about what happens when someone uploads something else entirely. The attacker's job is to think about exactly that.
Why is a file upload vulnerability considered higher impact than, for example, an information disclosure vulnerability?