CVE-2023-22974

A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:45

Type Values Removed Values Added
References () https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes () https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes
References () https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory () https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory

Information

Published : 2023-02-22 21:15

Updated : 2024-11-21 07:45


NVD link : CVE-2023-22974

Mitre link : CVE-2023-22974

CVE.ORG link : CVE-2023-22974


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-552

Files or Directories Accessible to External Parties