CVE-2017-9380 – OpenEMR 5.0.0 - Remote Code Execution (Authenticated)
https://notcve.org/view.php?id=CVE-2017-9380
OpenEMR 5.0.0 and prior allows low-privilege users to upload files of dangerous types which can result in arbitrary code execution within the context of the vulnerable application. OpenEMR versión 5.0.0 y anteriores, permite a los usuarios poco privilegiados cargar archivos de tipos peligrosos, lo que puede resultar en la ejecución de código arbitraria en el contexto de la aplicación vulnerable. • https://www.exploit-db.com/exploits/49983 http://packetstormsecurity.com/files/163087/OpenEMR-5.0.0-Remote-Shell-Upload.html https://github.com/Hacker5preme/Exploits/tree/main/CVE-2017-9380-Exploit https://www.wizlynxgroup.com/security-research-advisories/vuln/WLX-2017-002 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-2017-6394
https://notcve.org/view.php?id=CVE-2017-6394
Multiple Cross-Site Scripting (XSS) issues were discovered in OpenEMR 5.0.0 and 5.0.1-dev. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to the "openemr-master/gacl/admin/object_search.php" URL (section_value; src_form). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. Se ha descubierto un problema en OpenEMR 5.0.1-dev. La vulnerabilidad existe debido a filtración insuficiente de datos suministrados por el usuario pasados a la URL "openemr-master/gacl/admin/object_search.php". • http://www.securityfocus.com/bid/96539 http://www.securityfocus.com/bid/96576 https://github.com/openemr/openemr/issues/498 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •