vendor:
OpenMRS
by:
Gjoko 'LiquidWorm' Krstic
N/A
CVSS
N/A
Expression Language Injection
N/A
CWE
Product Name: OpenMRS
Affected Version From: OpenMRS 2.3, 2.2, 2.1, 2.0 (Platform 1.11.4 (Build 6ebcaf), 1.11.2 and 1.10.0)
Affected Version To: OpenMRS-TB System (OpenMRS 1.9.7 (Build 60bd9b))
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 12.04.5 LTS, Apache Tomcat/7.0.26, Apache Tomcat/6.0.36, Apache Coyote/1.1
2015
OpenMRS 2.3 (1.11.4) Expression Language Injection Vulnerability
Input passed via the 'personType' parameter is not properly sanitised in the spring's expression language support via 'addPerson.htm' script before being used. This can be exploited to inject expression language (EL) and subsequently execute arbitrary Java code.
Mitigation:
Disabled serialization and deserialization of dynamic proxies, Disabled deserialization of external entities in XML files, Disabled spring's Expression Language support