A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.
References
Link | Resource |
---|---|
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 | Patch Release Notes |
https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ | Exploit Third Party Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 | Patch Release Notes |
https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes | |
References | () https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory |
Information
Published : 2023-02-22 21:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22974
Mitre link : CVE-2023-22974
CVE.ORG link : CVE-2023-22974
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-552
Files or Directories Accessible to External Parties