vendor:
OpenEMR
by:
Alexandre ZANNI
9.8
CVSS
HIGH
Remote Code Execution
94
CWE
Product Name: OpenEMR
Affected Version From: < 5.0.1
Affected Version To: 5.0.1 (Patch 4)
Patch Exists: YES
Related CWE: N/A
CPE: a:openemr:openemr
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: Ubuntu 18.04, OpenEMR Version 5.0.1.3
2020
OpenEMR 5.0.1 – Remote Code Execution (Authenticated) (2)
OpenEMR is a free and open source electronic health records and medical practice management application. A vulnerability exists in OpenEMR versions prior to 5.0.1 (Patch 4) that allows an authenticated user to execute arbitrary code on the server. This is due to the lack of input validation in the 'interface/main/calendar/add_edit_event.php' script, which allows an attacker to inject arbitrary PHP code into the 'form_comments' parameter. This code is then executed by the server when the 'Save' button is clicked.
Mitigation:
Upgrade to OpenEMR version 5.0.1 (Patch 4) or later.