CVE-2021-40352

OpenEMR 6.0.0 has a pnotes_print.php?noteid= Insecure Direct Object Reference vulnerability via which an attacker can read the messages of all users.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:6.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:23

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/164011/OpenEMR-6.0.0-Insecure-Direct-Object-Reference.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/allenenosh/CVE-2021-40352 - Exploit, Third Party Advisory () https://github.com/allenenosh/CVE-2021-40352 - Exploit, Third Party Advisory
References () https://www.open-emr.org/wiki/index.php/Securing_OpenEMR - Product, Vendor Advisory () https://www.open-emr.org/wiki/index.php/Securing_OpenEMR - Product, Vendor Advisory

Information

Published : 2021-09-01 13:15

Updated : 2024-11-21 06:23


NVD link : CVE-2021-40352

Mitre link : CVE-2021-40352

CVE.ORG link : CVE-2021-40352


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-639

Authorization Bypass Through User-Controlled Key