vendor:
OpenEMR
by:
SecurityFocus
7,5
CVSS
HIGH
Local File-Include and Command-Injection
94, 78
CWE
Product Name: OpenEMR
Affected Version From: 4.1.0
Affected Version To: 4.1.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2012
OpenEMR Local File-Include and Command-Injection Vulnerabilities
OpenEMR is prone to local file-include and command-injection vulnerabilities because it fails to properly sanitize user-supplied input. A remote attacker can exploit these issues to execute arbitrary shell commands with the privileges of the user running the application, obtain potentially sensitive information, and execute arbitrary local scripts in the context of the Web server process. This could allow the attacker to compromise the application and the computer; other attacks are also possible.
Mitigation:
Input validation should be used to ensure that untrusted data is not used to execute unintended commands.