gsd-2007-0649
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified "Open Conference Systems," but this was an error.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2007-0649",
    "description": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays.  NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error.",
    "id": "GSD-2007-0649"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2007-0649"
      ],
      "details": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays.  NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error.",
      "id": "GSD-2007-0649",
      "modified": "2023-12-13T01:21:36.064723Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "cve@mitre.org",
        "ID": "CVE-2007-0649",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "n/a",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "n/a"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "n/a"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays.  NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error."
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "20070130 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded"
          },
          {
            "name": "20070129 [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion] (fwd)",
            "refsource": "VIM",
            "url": "http://attrition.org/pipermail/vim/2007-January/001254.html"
          },
          {
            "name": "20070129 Fake: Open Conference Systems = 2.8.2 Remote File Inclusion",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded"
          },
          {
            "name": "33603",
            "refsource": "OSVDB",
            "url": "http://osvdb.org/33603"
          },
          {
            "name": "22348",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/22348"
          },
          {
            "name": "20070129 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded"
          },
          {
            "name": "22346",
            "refsource": "BID",
            "url": "http://www.securityfocus.com/bid/22346"
          },
          {
            "name": "33609",
            "refsource": "OSVDB",
            "url": "http://osvdb.org/33609"
          },
          {
            "name": "2202",
            "refsource": "SREASON",
            "url": "http://securityreason.com/securityalert/2202"
          },
          {
            "name": "20070127 Open Conference Systems = 2.8.2 Remote File Inclusion",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded"
          },
          {
            "name": "20070128 Re: Open Conference Systems = 2.8.2 Remote File Inclusion",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded"
          },
          {
            "name": "20070127 Re: Open Conference Systems = 2.8.2 Remote File Inclusion",
            "refsource": "BUGTRAQ",
            "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded"
          },
          {
            "name": "20070131 VERIFY of RFI and XSS in OpenEMR 2.8.2 (was [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion])",
            "refsource": "VIM",
            "url": "http://attrition.org/pipermail/vim/2007-January/001258.html"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "configurations": {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:openemr:openemr:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "2.8.2",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      },
      "cve": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0649"
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "en",
              "value": "Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays.  NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified \"Open Conference Systems,\" but this was an error."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "en",
                  "value": "CWE-94"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20070129 [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion] (fwd)",
              "refsource": "VIM",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://attrition.org/pipermail/vim/2007-January/001254.html"
            },
            {
              "name": "20070131 VERIFY of RFI and XSS in OpenEMR 2.8.2 (was [still bogus] V [mike at carstein.kill-9.pl: Re: Open Conference Systems = 2.8.2 Remote File Inclusion])",
              "refsource": "VIM",
              "tags": [
                "Vendor Advisory"
              ],
              "url": "http://attrition.org/pipermail/vim/2007-January/001258.html"
            },
            {
              "name": "22346",
              "refsource": "BID",
              "tags": [],
              "url": "http://www.securityfocus.com/bid/22346"
            },
            {
              "name": "22348",
              "refsource": "BID",
              "tags": [],
              "url": "http://www.securityfocus.com/bid/22348"
            },
            {
              "name": "2202",
              "refsource": "SREASON",
              "tags": [],
              "url": "http://securityreason.com/securityalert/2202"
            },
            {
              "name": "33609",
              "refsource": "OSVDB",
              "tags": [],
              "url": "http://osvdb.org/33609"
            },
            {
              "name": "33603",
              "refsource": "OSVDB",
              "tags": [],
              "url": "http://osvdb.org/33603"
            },
            {
              "name": "20070130 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/458565/100/0/threaded"
            },
            {
              "name": "20070128 Re: Open Conference Systems = 2.8.2 Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/458486/100/0/threaded"
            },
            {
              "name": "20070129 Re: Fake: Open Conference Systems = 2.8.2 Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/458476/100/0/threaded"
            },
            {
              "name": "20070129 Fake: Open Conference Systems = 2.8.2 Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/458456/100/0/threaded"
            },
            {
              "name": "20070127 Re: Open Conference Systems = 2.8.2 Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/458426/100/0/threaded"
            },
            {
              "name": "20070127 Open Conference Systems = 2.8.2 Remote File Inclusion",
              "refsource": "BUGTRAQ",
              "tags": [],
              "url": "http://www.securityfocus.com/archive/1/458306/100/0/threaded"
            }
          ]
        }
      },
      "impact": {
        "baseMetricV2": {
          "cvssV2": {
            "accessComplexity": "HIGH",
            "accessVector": "NETWORK",
            "authentication": "MULTIPLE",
            "availabilityImpact": "PARTIAL",
            "baseScore": 4.3,
            "confidentialityImpact": "PARTIAL",
            "integrityImpact": "PARTIAL",
            "vectorString": "AV:N/AC:H/Au:M/C:P/I:P/A:P",
            "version": "2.0"
          },
          "exploitabilityScore": 3.2,
          "impactScore": 6.4,
          "obtainAllPrivilege": false,
          "obtainOtherPrivilege": false,
          "obtainUserPrivilege": false,
          "severity": "MEDIUM",
          "userInteractionRequired": false
        }
      },
      "lastModifiedDate": "2018-10-16T16:33Z",
      "publishedDate": "2007-02-01T01:28Z"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…