An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.
References
Link | Resource |
---|---|
https://github.com/openemr/openemr | Product Third Party Advisory |
https://securityforeveryone.com/blog/inactive-post-test/openemr-0-day-idor-vulnerability | Not Applicable |
https://www.open-emr.org/ | Vendor Advisory |
https://github.com/openemr/openemr | Product Third Party Advisory |
https://securityforeveryone.com/blog/inactive-post-test/openemr-0-day-idor-vulnerability | Not Applicable |
https://www.open-emr.org/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/openemr/openemr - Product, Third Party Advisory | |
References | () https://securityforeveryone.com/blog/inactive-post-test/openemr-0-day-idor-vulnerability - Not Applicable | |
References | () https://www.open-emr.org/ - Vendor Advisory |
Information
Published : 2022-03-03 00:15
Updated : 2024-11-21 06:52
NVD link : CVE-2022-25471
Mitre link : CVE-2022-25471
CVE.ORG link : CVE-2022-25471
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-639
Authorization Bypass Through User-Controlled Key