A Local File Inclusion (LFI) vulnerability in interface/forms/LBF/new.php in OpenEMR < 7.0.0 allows remote authenticated users to execute code via the formname parameter.
References
Link | Resource |
---|---|
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 | Patch Release Notes |
https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ | Exploit Third Party Advisory |
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 | Patch Release Notes |
https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes | |
References | () https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory |
03 Mar 2023, 03:00
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
References | (MISC) https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory | |
References | (MISC) https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes | |
CWE | CWE-22 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
23 Feb 2023, 14:19
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-02-22 21:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22973
Mitre link : CVE-2023-22973
CVE.ORG link : CVE-2023-22973
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')