OpenEMR before 5.0.0 Patch 5 allows unauthenticated remote database copying because setup.php exposes functionality for cloning an existing OpenEMR site to an arbitrary attacker-controlled MySQL server via vectors involving a crafted state parameter.
References
| Link | Resource |
|---|---|
| http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Issue Tracking Patch Vendor Advisory |
| http://www.securityfocus.com/bid/101983 | |
| https://isears.github.io/jekyll/update/2017/10/28/openemr-database-disclosure.html | Exploit Issue Tracking Third Party Advisory |
| http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | Issue Tracking Patch Vendor Advisory |
| http://www.securityfocus.com/bid/101983 | |
| https://isears.github.io/jekyll/update/2017/10/28/openemr-database-disclosure.html | Exploit Issue Tracking Third Party Advisory |
Configurations
History
21 Nov 2024, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://www.open-emr.org/wiki/index.php/OpenEMR_Patches - Issue Tracking, Patch, Vendor Advisory | |
| References | () http://www.securityfocus.com/bid/101983 - | |
| References | () https://isears.github.io/jekyll/update/2017/10/28/openemr-database-disclosure.html - Exploit, Issue Tracking, Third Party Advisory |
Information
Published : 2017-11-04 19:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-16540
Mitre link : CVE-2017-16540
CVE.ORG link : CVE-2017-16540
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
