vendor:
OpenMRS
by:
Brian D. Hysell
9,8
CVSS
CRITICAL
Remote Code Execution
502
CWE
Product Name: OpenMRS
Affected Version From: OpenMRS Standalone 2.3 and OpenMRS Platform 1.11.4 WAR with Reporting 0.9.7 and Appointment Scheduling UI 1.0.3
Affected Version To: Other versions and configurations containing these modules
Patch Exists: YES
Related CWE: CVE-2013-7285
CPE: a:openmrs:openmrs
Other Scripts:
N/A
Tags: cve,cve2013,xstream,deserialization,rce,oast
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Nuclei References:
https://x-stream.github.io/CVE-2013-7285.html, https://www.mail-archive.com/user@xstream.codehaus.org/msg00607.html, https://www.mail-archive.com/user@xstream.codehaus.org/msg00604.html, https://nvd.nist.gov/vuln/detail/cve-2013-7285, https://blog.csdn.net/Xxy605/article/details/126297121
Nuclei Metadata: {'max-request': 1, 'vendor': 'xstream_project', 'product': 'xstream'}
Platforms Tested: Web
2013
Unauthenticated remote code execution in OpenMRS
Xstream API before 1.4.6 and 1.4.10 is susceptible to remote code execution. If the security framework has not been initialized, an attacker can run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. This can allow an attacker to obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
Mitigation:
Upgrade to the latest version of OpenMRS Reporting Module and Appointment Scheduling UI Module.