CVE-2017-6394
https://notcve.org/view.php?id=CVE-2017-6394
Multiple Cross-Site Scripting (XSS) issues were discovered in OpenEMR 5.0.0 and 5.0.1-dev. The vulnerabilities exist due to insufficient filtration of user-supplied data passed to the "openemr-master/gacl/admin/object_search.php" URL (section_value; src_form). An attacker could execute arbitrary HTML and script code in a browser in the context of the vulnerable website. Se ha descubierto un problema en OpenEMR 5.0.1-dev. La vulnerabilidad existe debido a filtración insuficiente de datos suministrados por el usuario pasados a la URL "openemr-master/gacl/admin/object_search.php". • http://www.securityfocus.com/bid/96539 http://www.securityfocus.com/bid/96576 https://github.com/openemr/openemr/issues/498 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2015-4453
https://notcve.org/view.php?id=CVE-2015-4453
interface/globals.php in OpenEMR 2.x, 3.x, and 4.x before 4.2.0 patch 2 allows remote attackers to bypass authentication and obtain sensitive information via an ignoreAuth=1 value to certain scripts, as demonstrated by (1) interface/fax/fax_dispatch_newpid.php and (2) interface/billing/sl_eob_search.php. interface/globals.php en OpenEMR 2.x, 3.x y 4.x en versiones anteriores a 4.2.0 patch 2 permite a atacantes remotos eludir la autenticación y obtener información sensible a través de un valor ignoreAuth=1 a ciertas secuencias, como se demuestra por (1) interface/fax/fax_dispatch_newpid.php y (2) interface/billing/sl_eob_search.php. • http://jvn.jp/en/jp/JVN22677713/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2015-000092 http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html http://seclists.org/fulldisclosure/2015/Jun/48 http://www.open-emr.org/wiki/index.php/OpenEMR_Patches http://www.securityfocus.com/bid/75299 • CWE-287: Improper Authentication •
CVE-2014-5462 – OpenEMR 4.1.2 - Multiple SQL Injections
https://notcve.org/view.php?id=CVE-2014-5462
Multiple SQL injection vulnerabilities in OpenEMR 4.1.2 (Patch 7) and earlier allow remote authenticated users to execute arbitrary SQL commands via the (1) layout_id parameter to interface/super/edit_layout.php; (2) form_patient_id, (3) form_drug_name, or (4) form_lot_number parameter to interface/reports/prescriptions_report.php; (5) payment_id parameter to interface/billing/edit_payment.php; (6) id parameter to interface/forms_admin/forms_admin.php; (7) form_pid or (8) form_encounter parameter to interface/billing/sl_eob_search.php; (9) sortby parameter to interface/logview/logview.php; form_facility parameter to (10) procedure_stats.php, (11) pending_followup.php, or (12) pending_orders.php in interface/orders/; (13) patient, (14) encounterid, (15) formid, or (16) issue parameter to interface/patient_file/deleter.php; (17) search_term parameter to interface/patient_file/encounter/coding_popup.php; (18) text parameter to interface/patient_file/encounter/search_code.php; (19) form_addr1, (20) form_addr2, (21) form_attn, (22) form_country, (23) form_freeb_type, (24) form_partner, (25) form_name, (26) form_zip, (27) form_state, (28) form_city, or (29) form_cms_id parameter to interface/practice/ins_search.php; (30) form_pid parameter to interface/patient_file/problem_encounter.php; (31) patient, (32) form_provider, (33) form_apptstatus, or (34) form_facility parameter to interface/reports/appointments_report.php; (35) db_id parameter to interface/patient_file/summary/demographics_save.php; (36) p parameter to interface/fax/fax_dispatch_newpid.php; or (37) patient_id parameter to interface/patient_file/reminder/patient_reminders.php. Múltiples vulnerabilidades de inyección SQL en OpenEMR versión 4.1.2 (Parche 7) y anteriores, permiten a los usuarios autenticados remotos ejecutar comandos SQL arbitrarios por medio del (1) parámetro layout_id en el archivo interface/super/edit_layout.php; parámetro (2) form_patient_id, (3) form_drug_name, o (4) form_lot_number en el archivo interface/reports/prescriptions_report.php; (5) parámetro payment_id en el archivo interface/billing/edit_payment.php; (6) parámetro id en el archivo interface/forms_admin/forms_admin.php; parámetro (7) form_pid o (8) form_encounter en el archivo interface/billing/sl_eob_search.php; (9) parámetro sortby en el archivo interface/logview/logview.php; parámetro form_facility en el archivo (10) procedure_stats.php, (11) pending_followup.php, o (12) pending_orders.php en interface/orders/; parámetro (13) patient, (14) encounterid, (15) formid, o (16) issue en el archivo interface/patient_file/deleter.php; (17) parámetro search_term en el archivo interface/patient_file/encounter/coding_popup.php; (18) parámetro text en el archivo interface/patient_file/encounter/search_code.php; parámetro (19) form_addr1, (20) form_addr2, (21) form_attn, (22) form_country, (23) form_freeb_type, (24) form_partner, (25) form_name, (26) form_zip, (27) form_state, (28) form_city, o (29) form_cms_id en el archivo interface/practice/ins_search.php; (30) parámetro form_pid en el archivo interface/patient_file/problem_encounter.php; parámetro (31) patient, (32) form_provider, (33) form_apptstatus, o (34) form_facility en el archivo interface/reports/appointments_report.php; (35) parámetro db_id en el archivo interface/patient_file/summary/demographics_save.php; (36) parámetro p en el archivo interface/fax/fax_dispatch_newpid.php; o (37) parámetro patient_id en el archivo interface/patient_file/reminder/patient_reminders.php. OpenEMR versions 4.1.2(7) and below suffer from multiple remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/35518 http://packetstormsecurity.com/files/129403/OpenEMR-4.1.2-7-SQL-Injection.html http://seclists.org/fulldisclosure/2014/Dec/24 https://github.com/openemr/openemr/issues/1782 https://www.portcullis-security.com/security-research-and-downloads/security-advisories/cve-2014-5462 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2013-4619 – OpenEMR 4.1.1 patch-12 Cross Site Scripting / SQL Injection
https://notcve.org/view.php?id=CVE-2013-4619
Multiple SQL injection vulnerabilities in OpenEMR 4.1.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) start or (2) end parameter to interface/reports/custom_report_range.php, or the (3) form_newid parameter to custom/chart_tracker.php. Múltiples vulnerabilidades de inyección SQL en OpenEMR v4.1.1 permite a usuarios autenticados remotamente ejecutar comandos SQL arbitrarios a través de los parámetros (1) “start” o (2) “end” interface/reports/custom_report_range.php, o en el parámetro (3) form_newid en custom/chart_tracker.php. OpenEMR versions 4.1.1 patch-12 and below suffer from cross site scripting and remote SQL injection vulnerabilities. • http://secunia.com/advisories/54083 http://sourceforge.net/p/openemr/code/ci/8a8a4607ba5ae2b9eb6b6a3b1b8ed7c6ea7e03b1 http://sourceforge.net/p/openemr/discussion/202506/thread/4854b2b1/#9658 https://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2013-4620 – OpenEMR 4.1 - 'note' HTML Injection
https://notcve.org/view.php?id=CVE-2013-4620
Cross-site scripting (XSS) vulnerability in interface/main/onotes/office_comments_full.php in OpenEMR 4.1.1 allows remote attackers to inject arbitrary web script or HTML via the note parameter. Vulnerabilidad Cross-site scripting (XSS) en interface/main/onotes/office_comments_full.php en OpenEMR v4.1.1 , permite a atacantes remotos ejecutar secuencias de comandos web o HTML arbitrarias a través del parámetro “note”. OpenEMR versions 4.1.1 patch-12 and below suffer from cross site scripting and remote SQL injection vulnerabilities. • https://www.exploit-db.com/exploits/38654 http://secunia.com/advisories/54083 http://sourceforge.net/p/openemr/code/ci/8a8a4607ba5ae2b9eb6b6a3b1b8ed7c6ea7e03b1 http://sourceforge.net/p/openemr/discussion/202506/thread/4854b2b1/#9658 https://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •