vendor:
OpenEMR
by:
noraj (Alexandre ZANNI)
8,8
CVSS
HIGH
Path Traversal
22
CWE
Product Name: OpenEMR
Affected Version From: < 5.0.2
Affected Version To: 5.0.1.7
Patch Exists: YES
Related CWE: CVE-2019-14530
CPE: a:openemr:openemr
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: OpenEMR Version 5.0.1
2021
OpenEMR 5.0.1.7 – ‘fileName’ Path Traversal (Authenticated) (2)
OpenEMR < 5.0.2 is vulnerable to an authenticated path traversal vulnerability which allows an attacker to read any file on the server. This vulnerability is due to the lack of proper input validation in the 'fileName' parameter of the 'ajax_download.php' script. An attacker can exploit this vulnerability by sending a specially crafted HTTP request with a malicious 'fileName' parameter.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to upgrade to the latest version of OpenEMR.