A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.
References
| Link | Resource |
|---|---|
| https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 | Patch Release Notes |
| https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ | Exploit Third Party Advisory |
| https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 | Patch Release Notes |
| https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes | |
| References | () https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory |
03 Mar 2023, 02:54
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-552 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | (MISC) https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory | |
| References | (MISC) https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes | |
| CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* |
23 Feb 2023, 14:19
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-02-22 21:15
Updated : 2024-11-21 07:45
NVD link : CVE-2023-22974
Mitre link : CVE-2023-22974
CVE.ORG link : CVE-2023-22974
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-552
Files or Directories Accessible to External Parties
