Vulnerabilites related to openemr - openemr
CVE-2025-29789 (GCVE-0-2025-29789)
Vulnerability from cvelistv5
Published
2025-03-25 20:29
Modified
2025-03-25 20:39
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-23 - Relative Path Traversal
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29789", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-25T20:33:59.251854Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-25T20:39:41.939Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.3.0" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. Versions prior to 7.3.0 are vulnerable to Directory Traversal in the Load Code feature. Version 7.3.0 contains a patch for the issue." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.6, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23: Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-25T20:29:29.892Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-ffpq-2wqj-v8ff", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-ffpq-2wqj-v8ff" }, { "name": "https://github.com/openemr/openemr/commit/ef3bb7f84ebe8ef54d55416e587ec2fefd065489", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openemr/openemr/commit/ef3bb7f84ebe8ef54d55416e587ec2fefd065489" } ], "source": { "advisory": "GHSA-ffpq-2wqj-v8ff", "discovery": "UNKNOWN" }, "title": "OpenEMR Has Directory Traversal in Load Code feature" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-29789", "datePublished": "2025-03-25T20:29:29.892Z", "dateReserved": "2025-03-11T14:23:00.476Z", "dateUpdated": "2025-03-25T20:39:41.939Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-13567 (GCVE-0-2020-13567)
Vulnerability from cvelistv5
Published
2022-04-18 16:15
Modified
2025-04-15 19:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Summary
Multiple SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:25:16.100Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2020-13567", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-15T18:23:17.780001Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-15T19:05:09.349Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "OpenEMR", "vendor": "OpenEMR", "versions": [ { "status": "affected", "version": "5.0.2" }, { "status": "affected", "version": "development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce)" } ] }, { "product": "phpGACL", "vendor": "phpGACL", "versions": [ { "status": "affected", "version": "3.3.7" } ] } ], "datePublic": "2021-01-04T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-04-18T16:15:22.000Z", "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "shortName": "talos" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "talos-cna@cisco.com", "DATE_PUBLIC": "2021-01-04", "ID": "CVE-2020-13567", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenEMR", "version": { "version_data": [ { "version_affected": "=", "version_value": "5.0.2" }, { "version_affected": "=", "version_value": "development version 6.0.0 (commit babec93f600ff1394f91ccd512bcad85832eb6ce)" } ] } } ] }, "vendor_name": "OpenEMR" }, { "product": { "product_data": [ { "product_name": "phpGACL", "version": { "version_data": [ { "version_affected": "=", "version_value": "3.3.7" } ] } } ] }, "vendor_name": "phpGACL" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability." } ] }, "impact": { "cvss": { "baseScore": 8.8, "baseSeverity": "High", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179", "refsource": "MISC", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1179" } ] } } } }, "cveMetadata": { "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", "assignerShortName": "talos", "cveId": "CVE-2020-13567", "datePublished": "2022-04-18T16:15:22.432Z", "dateReserved": "2020-05-26T00:00:00.000Z", "dateUpdated": "2025-04-15T19:05:09.349Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0992 (GCVE-0-2012-0992)
Vulnerability from cvelistv5
Published
2012-02-07 21:00
Modified
2024-08-06 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:26.111Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "name": "78731", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78731" }, { "name": "51788", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51788" }, { "name": "20120201 Multiple vulnerabilities in OpenEMR", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "name": "47781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47781" }, { "name": "openemr-faxdispatch-command-execution(72915)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72915" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "name": "78731", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78731" }, { "name": "51788", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51788" }, { "name": "20120201 Multiple vulnerabilities in OpenEMR", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "name": "47781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47781" }, { "name": "openemr-faxdispatch-command-execution(72915)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72915" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0992", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.htbridge.ch/advisory/HTB23069", "refsource": "MISC", "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "name": "78731", "refsource": "OSVDB", "url": "http://osvdb.org/78731" }, { "name": "51788", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51788" }, { "name": "20120201 Multiple vulnerabilities in OpenEMR", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "name": "47781", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47781" }, { "name": "openemr-faxdispatch-command-execution(72915)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72915" }, { "name": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", "refsource": "CONFIRM", "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0992", "datePublished": "2012-02-07T21:00:00", "dateReserved": "2012-02-02T00:00:00", "dateUpdated": "2024-08-06T18:45:26.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-31117 (GCVE-0-2025-31117)
Vulnerability from cvelistv5
Published
2025-03-31 16:49
Modified
2025-03-31 18:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in OpenEMR, allowing an attacker to force the server to make unauthorized requests to external or internal resources. this attack does not return a direct response but can be exploited through DNS or HTTP interactions to exfiltrate sensitive information. This vulnerability is fixed in 7.0.3.1.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31117", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:03:23.772148Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:04:16.352Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-2pvv-ph3x-2f9h" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. An Out-of-Band Server-Side Request Forgery (OOB SSRF) vulnerability was identified in OpenEMR, allowing an attacker to force the server to make unauthorized requests to external or internal resources. this attack does not return a direct response but can be exploited through DNS or HTTP interactions to exfiltrate sensitive information. This vulnerability is fixed in 7.0.3.1." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 6.9, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:49:14.739Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-2pvv-ph3x-2f9h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-2pvv-ph3x-2f9h" }, { "name": "https://github.com/openemr/openemr/commit/aa6f50efb2971285633fa77ea7a50949408cab12", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openemr/openemr/commit/aa6f50efb2971285633fa77ea7a50949408cab12" } ], "source": { "advisory": "GHSA-2pvv-ph3x-2f9h", "discovery": "UNKNOWN" }, "title": "OpenEMR Out-of-Band Server-Side Request Forgery (OOB SSRF) Vulnerability" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31117", "datePublished": "2025-03-31T16:49:14.739Z", "dateReserved": "2025-03-26T15:04:52.624Z", "dateUpdated": "2025-03-31T18:04:16.352Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30161 (GCVE-0-2025-30161)
Vulnerability from cvelistv5
Published
2025-03-31 16:12
Modified
2025-03-31 18:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. A stored XSS vulnerability in the Bronchitis form component of OpenEMR allows anyone who is able to edit a bronchitis form to steal credentials from administrators. This vulnerability is fixed in 7.0.3.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30161", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:21:37.541305Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:21:55.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. A stored XSS vulnerability in the Bronchitis form component of OpenEMR allows anyone who is able to edit a bronchitis form to steal credentials from administrators. This vulnerability is fixed in 7.0.3." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.4, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:12:29.064Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-59rv-645x-rg6p", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-59rv-645x-rg6p" }, { "name": "https://github.com/openemr/openemr/blob/17ca5539bafcdc25a9042ebc14480552e07867e4/interface/forms/bronchitis/view.php#L102-L103", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openemr/openemr/blob/17ca5539bafcdc25a9042ebc14480552e07867e4/interface/forms/bronchitis/view.php#L102-L103" }, { "name": "https://github.com/openemr/openemr/blob/17ca5539bafcdc25a9042ebc14480552e07867e4/interface/forms/bronchitis/view.php#L303-L304", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openemr/openemr/blob/17ca5539bafcdc25a9042ebc14480552e07867e4/interface/forms/bronchitis/view.php#L303-L304" } ], "source": { "advisory": "GHSA-59rv-645x-rg6p", "discovery": "UNKNOWN" }, "title": "OpenEMR Stored XSS in OpenEMR Bronchitis Form" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-30161", "datePublished": "2025-03-31T16:12:29.064Z", "dateReserved": "2025-03-17T12:41:42.566Z", "dateUpdated": "2025-03-31T18:21:55.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5811 (GCVE-0-2006-5811)
Vulnerability from cvelistv5
Published
2006-11-08 23:00
Modified
2024-08-07 20:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PHP remote file inclusion vulnerability in library/translation.inc.php in OpenEMR 2.8.1, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[srcdir] parameter.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:55.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2727", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2727" }, { "name": "20061106 [ECHO_ADV_60_2006] OpenEMR \u003c=2.8.1 Multiple Remote File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "name": "openemr-srcdir-file-include(30036)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "name": "ADV-2006-4382", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "name": "1844", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1844" }, { "name": "22695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-01T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in library/translation.inc.php in OpenEMR 2.8.1, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[srcdir] parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2727", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2727" }, { "name": "20061106 [ECHO_ADV_60_2006] OpenEMR \u003c=2.8.1 Multiple Remote File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "name": "openemr-srcdir-file-include(30036)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "tags": [ "x_refsource_MISC" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "name": "ADV-2006-4382", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "name": "1844", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1844" }, { "name": "22695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5811", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in library/translation.inc.php in OpenEMR 2.8.1, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[srcdir] parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2727", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2727" }, { "name": "20061106 [ECHO_ADV_60_2006] OpenEMR \u003c=2.8.1 Multiple Remote File Inclusion Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "name": "openemr-srcdir-file-include(30036)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "name": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt", "refsource": "MISC", "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "name": "ADV-2006-4382", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "name": "1844", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1844" }, { "name": "22695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22695" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5811", "datePublished": "2006-11-08T23:00:00", "dateReserved": "2006-11-08T00:00:00", "dateUpdated": "2024-08-07T20:04:55.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-29772 (GCVE-0-2025-29772)
Vulnerability from cvelistv5
Published
2025-03-31 16:03
Modified
2025-03-31 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. The POST parameter hidden_subcategory is output to the page without being properly processed. This leads to a reflected cross-site scripting (XSS) vul;nerability in CAMOS new.php. This vulnerability is fixed in 7.0.3.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-29772", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:33:21.376775Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:34:56.541Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. The POST parameter hidden_subcategory is output to the page without being properly processed. This leads to a reflected cross-site scripting (XSS) vul;nerability in CAMOS new.php. This vulnerability is fixed in 7.0.3." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 7.2, "baseSeverity": "HIGH", "privilegesRequired": "LOW", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:03:32.711Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-89gp-g4c9-hv8h", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-89gp-g4c9-hv8h" }, { "name": "https://github.com/openemr/openemr/commit/17c5c424695de50db94f2c01fb9abfc441d09a1a", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openemr/openemr/commit/17c5c424695de50db94f2c01fb9abfc441d09a1a" } ], "source": { "advisory": "GHSA-89gp-g4c9-hv8h", "discovery": "UNKNOWN" }, "title": "OpenEMR allows Reflected XSS in CAMOS new.php" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-29772", "datePublished": "2025-03-31T16:03:32.711Z", "dateReserved": "2025-03-11T14:23:00.474Z", "dateUpdated": "2025-03-31T18:34:56.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32794 (GCVE-0-2025-32794)
Vulnerability from cvelistv5
Published
2025-05-23 15:15
Modified
2025-05-23 17:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient's encounter under Orders → Procedure Orders. Version 7.0.3.4 contains a patch for the issue.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32794", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-23T17:00:49.926114Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-23T17:00:53.086Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the First and Last Name fields during patient registration. This code is later executed when viewing the patient\u0027s encounter under Orders \u2192 Procedure Orders. Version 7.0.3.4 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-23T15:15:32.925Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-3c27-2m7h-f7rx" } ], "source": { "advisory": "GHSA-3c27-2m7h-f7rx", "discovery": "UNKNOWN" }, "title": "OpenEMR Stored XSS via Patient Name Field in Procedure Orders" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-32794", "datePublished": "2025-05-23T15:15:32.925Z", "dateReserved": "2025-04-10T12:51:12.281Z", "dateUpdated": "2025-05-23T17:00:53.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-0649 (GCVE-0-2007-0649)
Vulnerability from cvelistv5
Published
2007-02-01 01:00
Modified
2024-08-07 12:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified "Open Conference Systems," but this was an error.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:26:53.788Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20070130 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded" }, { "name": "20070129 [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion] (fwd)", "tags": [ "mailing-list", "x_refsource_VIM", "x_transferred" ], "url": "http://attrition.org/pipermail/vim/2007-January/001254.html" }, { "name": "20070129 Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded" }, { "name": "33603", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33603" }, { "name": "22348", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22348" }, { "name": "20070129 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded" }, { "name": "22346", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22346" }, { "name": "33609", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/33609" }, { "name": "2202", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/2202" }, { "name": "20070127 Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded" }, { "name": "20070128 Re: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded" }, { "name": "20070127 Re: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded" }, { "name": "20070131 VERIFY of RFI and XSS in OpenEMR 2.8.2 (was [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion])", "tags": [ "mailing-list", "x_refsource_VIM", "x_transferred" ], "url": "http://attrition.org/pipermail/vim/2007-January/001258.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-01-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20070130 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded" }, { "name": "20070129 [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion] (fwd)", "tags": [ "mailing-list", "x_refsource_VIM" ], "url": "http://attrition.org/pipermail/vim/2007-January/001254.html" }, { "name": "20070129 Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded" }, { "name": "33603", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33603" }, { "name": "22348", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22348" }, { "name": "20070129 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded" }, { "name": "22346", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22346" }, { "name": "33609", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/33609" }, { "name": "2202", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/2202" }, { "name": "20070127 Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded" }, { "name": "20070128 Re: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded" }, { "name": "20070127 Re: Open Conference Systems = 2.8.2 Remote File Inclusion", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded" }, { "name": "20070131 VERIFY of RFI and XSS in OpenEMR 2.8.2 (was [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion])", "tags": [ "mailing-list", "x_refsource_VIM" ], "url": "http://attrition.org/pipermail/vim/2007-January/001258.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0649", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20070130 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded" }, { "name": "20070129 [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion] (fwd)", "refsource": "VIM", "url": "http://attrition.org/pipermail/vim/2007-January/001254.html" }, { "name": "20070129 Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded" }, { "name": "33603", "refsource": "OSVDB", "url": "http://osvdb.org/33603" }, { "name": "22348", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22348" }, { "name": "20070129 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded" }, { "name": "22346", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22346" }, { "name": "33609", "refsource": "OSVDB", "url": "http://osvdb.org/33609" }, { "name": "2202", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2202" }, { "name": "20070127 Open Conference Systems = 2.8.2 Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded" }, { "name": "20070128 Re: Open Conference Systems = 2.8.2 Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded" }, { "name": "20070127 Re: Open Conference Systems = 2.8.2 Remote File Inclusion", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded" }, { "name": "20070131 VERIFY of RFI and XSS in OpenEMR 2.8.2 (was [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion])", "refsource": "VIM", "url": "http://attrition.org/pipermail/vim/2007-January/001258.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0649", "datePublished": "2007-02-01T01:00:00", "dateReserved": "2007-01-31T00:00:00", "dateUpdated": "2024-08-07T12:26:53.788Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-30149 (GCVE-0-2025-30149)
Vulnerability from cvelistv5
Published
2025-03-31 16:07
Modified
2025-03-31 18:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. OpenEMR allows reflected cross-site scripting (XSS) in the AJAX Script interface\super\layout_listitems_ajax.php via the target parameter. This vulnerability is fixed in 7.0.3.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-30149", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-03-31T18:04:22.508672Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-31T18:04:29.366Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-fwfv-8583-6rr7" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. OpenEMR allows reflected cross-site scripting (XSS) in the AJAX Script interface\\super\\layout_listitems_ajax.php via the target parameter. This vulnerability is fixed in 7.0.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T16:07:11.417Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-fwfv-8583-6rr7", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-fwfv-8583-6rr7" }, { "name": "https://github.com/openemr/openemr/commit/6cb70595f65decfbdd03e70b49acc414e03744b8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openemr/openemr/commit/6cb70595f65decfbdd03e70b49acc414e03744b8" } ], "source": { "advisory": "GHSA-fwfv-8583-6rr7", "discovery": "UNKNOWN" }, "title": "OpenEMR Reflected XSS in AJAX Script" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-30149", "datePublished": "2025-03-31T16:07:11.417Z", "dateReserved": "2025-03-17T12:41:42.565Z", "dateUpdated": "2025-03-31T18:04:29.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-32967 (GCVE-0-2025-32967)
Vulnerability from cvelistv5
Published
2025-05-23 15:31
Modified
2025-05-23 15:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-778 - Insufficient Logging
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. A logging oversight in versions prior to 7.0.3.4 allows password change events to go unrecorded on the client-side log viewer, preventing administrators from auditing critical actions. This weakens traceability and opens the system to undetectable misuse by insiders or attackers. Version 7.0.3.4 contains a patch for the issue.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-32967", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-23T15:40:00.419569Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-23T15:40:15.258Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. A logging oversight in versions prior to 7.0.3.4 allows password change events to go unrecorded on the client-side log viewer, preventing administrators from auditing critical actions. This weakens traceability and opens the system to undetectable misuse by insiders or attackers. Version 7.0.3.4 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-778", "description": "CWE-778: Insufficient Logging", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-23T15:31:52.551Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-7qj6-jxfc-xw4v", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-7qj6-jxfc-xw4v" } ], "source": { "advisory": "GHSA-7qj6-jxfc-xw4v", "discovery": "UNKNOWN" }, "title": "OpenEMR doesn\u0027t log password administration properly" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-32967", "datePublished": "2025-05-23T15:31:52.551Z", "dateReserved": "2025-04-14T21:47:11.454Z", "dateUpdated": "2025-05-23T15:40:15.258Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-5795 (GCVE-0-2006-5795)
Vulnerability from cvelistv5
Published
2006-11-08 20:00
Modified
2024-08-07 20:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T20:04:55.476Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "2727", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/2727" }, { "name": "20061106 [ECHO_ADV_60_2006] OpenEMR \u003c=2.8.1 Multiple Remote File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "name": "openemr-srcdir-file-include(30036)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "name": "1834", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/1834" }, { "name": "ADV-2006-4382", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "name": "22695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/22695" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-11-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "2727", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/2727" }, { "name": "20061106 [ECHO_ADV_60_2006] OpenEMR \u003c=2.8.1 Multiple Remote File Inclusion Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "name": "openemr-srcdir-file-include(30036)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "tags": [ "x_refsource_MISC" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "name": "1834", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/1834" }, { "name": "ADV-2006-4382", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "name": "22695", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/22695" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-5795", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "2727", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/2727" }, { "name": "20061106 [ECHO_ADV_60_2006] OpenEMR \u003c=2.8.1 Multiple Remote File Inclusion Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "name": "openemr-srcdir-file-include(30036)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "name": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt", "refsource": "MISC", "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "name": "1834", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/1834" }, { "name": "ADV-2006-4382", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "name": "22695", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22695" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-5795", "datePublished": "2006-11-08T20:00:00", "dateReserved": "2006-11-08T00:00:00", "dateUpdated": "2024-08-07T20:04:55.476Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-43860 (GCVE-0-2025-43860)
Vulnerability from cvelistv5
Published
2025-05-23 15:35
Modified
2025-05-23 15:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation and editing privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the (1) Text Box fields of Address, Address Line 2, Postal Code and City fields and (2) Drop Down menu options of Address Use, State and Country of the Additional Addresses section of the Contact tab in Patient Demographics. The injected script can execute in two scenarios: (1) dynamically during form input, and (2) when the form data is later loaded for editing. Version 7.0.3.4 contains a patch for the issue.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-43860", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-05-23T15:55:12.232157Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-05-23T15:55:24.068Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3.4" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. A stored cross-site scripting (XSS) vulnerability in versions prior to 7.0.3.4 allows any authenticated user with patient creation and editing privileges to inject arbitrary JavaScript code into the system by entering malicious payloads in the (1) Text Box fields of Address, Address Line 2, Postal Code and City fields and (2) Drop Down menu options of Address Use, State and Country of the Additional Addresses section of the Contact tab in Patient Demographics. The injected script can execute in two scenarios: (1) dynamically during form input, and (2) when the form data is later loaded for editing. Version 7.0.3.4 contains a patch for the issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-05-23T15:35:01.087Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-2h9p-7vmc-wmqv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-2h9p-7vmc-wmqv" } ], "source": { "advisory": "GHSA-2h9p-7vmc-wmqv", "discovery": "UNKNOWN" }, "title": "OpemRMS Vulnerable to Stored XSS Attack in the Additional Address Section of Patient Demographics" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-43860", "datePublished": "2025-05-23T15:35:01.087Z", "dateReserved": "2025-04-17T20:07:08.556Z", "dateUpdated": "2025-05-23T15:55:24.068Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-0991 (GCVE-0-2012-0991)
Vulnerability from cvelistv5
Published
2012-02-07 21:00
Modified
2024-08-06 18:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
References
► | URL | Tags | ||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:45:26.264Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "name": "78727", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78727" }, { "name": "51788", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/51788" }, { "name": "20120201 Multiple vulnerabilities in OpenEMR", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "name": "47781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/47781" }, { "name": "78729", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78729" }, { "name": "78728", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78728" }, { "name": "openemr-formname-file-include(72914)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72914" }, { "name": "78730", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/78730" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-01-29T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "name": "78727", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78727" }, { "name": "51788", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/51788" }, { "name": "20120201 Multiple vulnerabilities in OpenEMR", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "name": "47781", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/47781" }, { "name": "78729", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78729" }, { "name": "78728", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78728" }, { "name": "openemr-formname-file-include(72914)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72914" }, { "name": "78730", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/78730" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-0991", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.htbridge.ch/advisory/HTB23069", "refsource": "MISC", "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "name": "78727", "refsource": "OSVDB", "url": "http://osvdb.org/78727" }, { "name": "51788", "refsource": "BID", "url": "http://www.securityfocus.com/bid/51788" }, { "name": "20120201 Multiple vulnerabilities in OpenEMR", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "name": "47781", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/47781" }, { "name": "78729", "refsource": "OSVDB", "url": "http://osvdb.org/78729" }, { "name": "78728", "refsource": "OSVDB", "url": "http://osvdb.org/78728" }, { "name": "openemr-formname-file-include(72914)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72914" }, { "name": "78730", "refsource": "OSVDB", "url": "http://osvdb.org/78730" }, { "name": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", "refsource": "CONFIRM", "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-0991", "datePublished": "2012-02-07T21:00:00", "dateReserved": "2012-02-02T00:00:00", "dateUpdated": "2024-08-06T18:45:26.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2006-2929 (GCVE-0-2006-2929)
Vulnerability from cvelistv5
Published
2006-06-09 10:00
Modified
2024-08-07 18:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:06:27.213Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/20505" }, { "name": "1886", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/1886" }, { "name": "openemr-fileroot-file-include(26984)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26984" }, { "name": "ADV-2006-2196", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/2196" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-06-07T00:00:00", "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-18T16:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20505", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/20505" }, { "name": "1886", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/1886" }, { "name": "openemr-fileroot-file-include(26984)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26984" }, { "name": "ADV-2006-2196", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/2196" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2006-2929", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20505", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20505" }, { "name": "1886", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/1886" }, { "name": "openemr-fileroot-file-include(26984)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26984" }, { "name": "ADV-2006-2196", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2196" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2006-2929", "datePublished": "2006-06-09T10:00:00", "dateReserved": "2006-06-09T00:00:00", "dateUpdated": "2024-08-07T18:06:27.213Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-31121 (GCVE-0-2025-31121)
Vulnerability from cvelistv5
Published
2025-04-01 14:53
Modified
2025-04-01 16:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 7.0.3.1, the Patient Image feature in OpenEMR is vulnerable to cross-site scripting attacks via the EXIF title in an image. This vulnerability is fixed in 7.0.3.1.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-31121", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-01T16:13:00.562220Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-01T16:13:34.453Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "openemr", "vendor": "openemr", "versions": [ { "status": "affected", "version": "\u003c 7.0.3.1" } ] } ], "descriptions": [ { "lang": "en", "value": "OpenEMR is a free and open source electronic health records and medical practice management application. Prior to 7.0.3.1, the Patient Image feature in OpenEMR is vulnerable to cross-site scripting attacks via the EXIF title in an image. This vulnerability is fixed in 7.0.3.1." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 7, "baseSeverity": "HIGH", "privilegesRequired": "HIGH", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "ACTIVE", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-01T14:53:03.469Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/openemr/openemr/security/advisories/GHSA-2w94-qmj6-3qxx", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/openemr/openemr/security/advisories/GHSA-2w94-qmj6-3qxx" } ], "source": { "advisory": "GHSA-2w94-qmj6-3qxx", "discovery": "UNKNOWN" }, "title": "OpenEMR allows XSS in Patient Image feature" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-31121", "datePublished": "2025-04-01T14:53:03.469Z", "dateReserved": "2025-03-26T15:04:52.625Z", "dateUpdated": "2025-04-01T16:13:34.453Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2012-02-07 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html | Patch, Vendor Advisory | |
cve@mitre.org | http://osvdb.org/78731 | ||
cve@mitre.org | http://secunia.com/advisories/47781 | Vendor Advisory | |
cve@mitre.org | http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/51788 | Exploit | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/72915 | ||
cve@mitre.org | https://www.htbridge.ch/advisory/HTB23069 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/78731 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/47781 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/51788 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/72915 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.htbridge.ch/advisory/HTB23069 | Exploit |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9264DF2-23B0-49C9-9BD3-44E863501273", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter." }, { "lang": "es", "value": "interface/fax/fax_dispatch.php en OpenEMR v4.1.0, permite a usuarios autenticados remotamente ejecutar comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres de linea de comandos en el par\u00e1metro file." } ], "id": "CVE-2012-0992", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-07T21:55:03.640", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/78731" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47781" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/51788" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72915" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78731" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/51788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72915" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://www.htbridge.ch/advisory/HTB23069" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-06-09 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/20505 | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2006/2196 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/26984 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/1886 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/20505 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/2196 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/26984 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/1886 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openemr:openemr:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4D9B71B-9DE4-47B3-A9E4-5D06B93A45E0", "versionEndIncluding": "2.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter." } ], "evaluatorSolution": "Successful exploitation requires that \"register_globals\" is enabled.", "id": "CVE-2006-2929", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-06-09T10:02:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20505" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/2196" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26984" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/1886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/20505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/2196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/1886" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-01 01:28
Modified
2025-04-09 00:30
Severity ?
Summary
Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified "Open Conference Systems," but this was an error.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://attrition.org/pipermail/vim/2007-January/001254.html | Vendor Advisory | |
cve@mitre.org | http://attrition.org/pipermail/vim/2007-January/001258.html | Vendor Advisory | |
cve@mitre.org | http://osvdb.org/33603 | ||
cve@mitre.org | http://osvdb.org/33609 | ||
cve@mitre.org | http://securityreason.com/securityalert/2202 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/458306/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/458426/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/458456/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/458476/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/458486/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/458565/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/22346 | ||
cve@mitre.org | http://www.securityfocus.com/bid/22348 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://attrition.org/pipermail/vim/2007-January/001254.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://attrition.org/pipermail/vim/2007-January/001258.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/33603 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/33609 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/2202 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/458306/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/458426/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/458456/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/458476/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/458486/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/458565/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/22346 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/22348 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openemr:openemr:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B48CD57-7385-4C6A-B71A-645FD47BF44F", "versionEndIncluding": "2.8.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error." }, { "lang": "es", "value": "Una vulnerabilidad de sobrescritura de variables en el archivo interface/globals.php en OpenEMR versi\u00f3n 2.8.2 y anteriores, permite a los atacantes remotos sobrescribir variables de programa arbitrarias y conducir otras actividades no autorizadas, como dirigir ataques de (a) inclusi\u00f3n de archivos remotos por medio del par\u00e1metro srcdir en custom/import_xml.php o (b) ataques de tipo Cross-Site Scripting (XSS) por medio del par\u00e1metro rootdir en interface/login/login_frame.php, por medio de vectores asociados con operaciones de extracci\u00f3n en POST y en matrices superglobales. NOTA: este problema se cuestion\u00f3 originalmente anterior a que se identificara el comportamiento del extracto en el an\u00e1lisis posterior a la divulgaci\u00f3n. Adicionalmente, el informe original se identific\u00f3 como \"Open Conference Systems,\" pero esto fue un error." } ], "evaluatorComment": "Incorrect bug report. This CVE should have a score of 0 because there are no products affected.", "id": "CVE-2007-0649", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "MULTIPLE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.2, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-02-01T01:28:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://attrition.org/pipermail/vim/2007-January/001254.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://attrition.org/pipermail/vim/2007-January/001258.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/33603" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/33609" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/2202" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22346" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/22348" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://attrition.org/pipermail/vim/2007-January/001254.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://attrition.org/pipermail/vim/2007-January/001258.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/33603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/33609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/2202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22348" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-11-08 23:07
Modified
2025-04-09 00:30
Severity ?
Summary
PHP remote file inclusion vulnerability in library/translation.inc.php in OpenEMR 2.8.1, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[srcdir] parameter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://advisories.echo.or.id/adv/adv60-theday-2006.txt | Exploit, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/22695 | Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/1844 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/450698/100/0/threaded | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/4382 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/30036 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/2727 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.echo.or.id/adv/adv60-theday-2006.txt | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22695 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/1844 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/450698/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/4382 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/30036 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/2727 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openemr:openemr:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "F1584C8E-9CF8-4A29-9664-FA8BACD09E0D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHP remote file inclusion vulnerability in library/translation.inc.php in OpenEMR 2.8.1, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[srcdir] parameter." }, { "lang": "es", "value": "Vulnerabilidad de inclusi\u00f3n remota de archivo en PHP en library/translation.inc.php de OpenEMR 2.8.1, cuando register_globals est\u00e1 activado, permite a atacantes remotos ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro GLOBALS[srcdir]." } ], "id": "CVE-2006-5811", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-08T23:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22695" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1844" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1844" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-02-07 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html | Exploit, Patch | |
cve@mitre.org | http://osvdb.org/78727 | ||
cve@mitre.org | http://osvdb.org/78728 | ||
cve@mitre.org | http://osvdb.org/78729 | ||
cve@mitre.org | http://osvdb.org/78730 | ||
cve@mitre.org | http://secunia.com/advisories/47781 | Vendor Advisory | |
cve@mitre.org | http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Patch | |
cve@mitre.org | http://www.securityfocus.com/bid/51788 | Exploit | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/72914 | ||
cve@mitre.org | https://www.htbridge.ch/advisory/HTB23069 | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html | Exploit, Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/78727 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/78728 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/78729 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/78730 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/47781 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/51788 | Exploit | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/72914 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.htbridge.ch/advisory/HTB23069 | Exploit, Patch |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D9264DF2-23B0-49C9-9BD3-44E863501273", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de salto de directorio en OpenEMR v4.1.0, permite a usuarios autenticados remotamente leer archivos de su elecci\u00f3n a trav\u00e9s de un .. (punto punto) en el par\u00e1metro formname en (1) contrib/acog/print_form.php; o (2) load_form.php, (3) view_form.php, o (4) trend_form.php en interface/patient_file/encounter." } ], "id": "CVE-2012-0991", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-02-07T21:55:03.547", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/78727" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/78728" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/78729" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/78730" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47781" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/51788" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72914" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch" ], "url": "https://www.htbridge.ch/advisory/HTB23069" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78729" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/78730" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/47781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/51788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://www.htbridge.ch/advisory/HTB23069" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-11-08 20:07
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://advisories.echo.or.id/adv/adv60-theday-2006.txt | Exploit, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/22695 | Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/1834 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/450698/100/0/threaded | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/4382 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/30036 | ||
cve@mitre.org | https://www.exploit-db.com/exploits/2727 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://advisories.echo.or.id/adv/adv60-theday-2006.txt | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/22695 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/1834 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/450698/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/4382 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/30036 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/2727 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openemr:openemr:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4D9B71B-9DE4-47B3-A9E4-5D06B93A45E0", "versionEndIncluding": "2.8.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inclusi\u00f3n remota de archivo en PHP en OpenEMR 2.8.1 y versiones anteriores, cuando el registro global est\u00e1 habilitado, permiten a atacantes remotos la ejecuci\u00f3n de c\u00f3digo PHP de su elecci\u00f3n mediante una URL en el par\u00e1metro srcdir del (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, y (d) print_billing_report.php en la ruta interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php y (i) main.php en la ruta interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, y (o) front_receipts_report.php en la ruta interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, y (r) user_info.php en la ruta interface/usergroup/; o del (s) custom/import_xml.php." } ], "id": "CVE-2006-5795", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2006-11-08T20:07:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22695" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/1834" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "source": "cve@mitre.org", "url": "https://www.exploit-db.com/exploits/2727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://advisories.echo.or.id/adv/adv60-theday-2006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/22695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/1834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/450698/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/4382" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30036" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/2727" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
jvndb-2015-000092
Vulnerability from jvndb
Published
2015-06-30 13:55
Modified
2015-07-14 17:16
Summary
OpenEMR vulnerable to authentication bypass
Details
OpenEMR is an electronic health records and medical practice management application. OpenEMR contains an authentication bypass vulnerability (CWE-302).
Shoji Baba reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
► | Type | URL |
---|---|---|
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000092.html", "dc:date": "2015-07-14T17:16+09:00", "dcterms:issued": "2015-06-30T13:55+09:00", "dcterms:modified": "2015-07-14T17:16+09:00", "description": "OpenEMR is an electronic health records and medical practice management application. OpenEMR contains an authentication bypass vulnerability (CWE-302).\r\n\r\nShoji Baba reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2015/JVNDB-2015-000092.html", "sec:cpe": { "#text": "cpe:/a:open-emr:openemr", "@product": "OpenEMR", "@vendor": "OpenEMR", "@version": "2.2" }, "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "@version": "2.0" }, "sec:identifier": "JVNDB-2015-000092", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN22677713/index.html", "@id": "JVN#22677713", "@source": "JVN" }, { "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4453", "@id": "CVE-2015-4453", "@source": "CVE" }, { "#text": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4453", "@id": "CVE-2015-4453", "@source": "NVD" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-287", "@title": "Improper Authentication(CWE-287)" } ], "title": "OpenEMR vulnerable to authentication bypass" }