Code Injection in GitHub repository openemr/openemr prior to 7.0.1.
References
Link | Resource |
---|---|
https://github.com/openemr/openemr/commit/c1c0805696ca68577c37bf30e29f90e5f3e0f1a9 | Patch |
https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9 | Exploit Patch Third Party Advisory |
Configurations
History
01 Jun 2023, 03:45
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (CONFIRM) https://huntr.dev/bounties/4190f944-dc2c-4624-9abf-31479456faa9 - Exploit, Patch, Third Party Advisory | |
References | (MISC) https://github.com/openemr/openemr/commit/c1c0805696ca68577c37bf30e29f90e5f3e0f1a9 - Patch |
27 May 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-27 22:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-2943
Mitre link : CVE-2023-2943
CVE.ORG link : CVE-2023-2943
JSON object : View
Products Affected
open-emr
- openemr
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')