CVE-2019-14530

An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:26

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-14530-Exploit - Exploit, Third Party Advisory () https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-14530-Exploit - Exploit, Third Party Advisory
References () https://github.com/Wezery/CVE-2019-14530 - Exploit, Third Party Advisory () https://github.com/Wezery/CVE-2019-14530 - Exploit, Third Party Advisory
References () https://github.com/openemr/openemr/pull/2592 - Patch, Third Party Advisory () https://github.com/openemr/openemr/pull/2592 - Patch, Third Party Advisory

Information

Published : 2019-08-13 14:15

Updated : 2024-11-21 04:26


NVD link : CVE-2019-14530

Mitre link : CVE-2019-14530

CVE.ORG link : CVE-2019-14530


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')