CVE-2019-14530
OpenEMR 5.0.1.7 - 'fileName' Path Traversal (Authenticated)
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
6Exploited in Wild
-Decision
Descriptions
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
Se descubrió un problema en custom / ajax_download.php en OpenEMR antes de 5.0.2 a través del parámetro fileName. Un atacante puede descargar cualquier de archivo (que pueda leer el usuario www-data) del almacenamiento del servidor. Si el archivo solicitado es editable para el usuario de www-data y existe el directorio / var / www / openemr / sites / default / documents / cqm_qrda /, se eliminará del servidor.
OpenEMR version 5.0.1.7 suffers from a path traversal vulnerability.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-08-02 CVE Reserved
- 2019-08-13 CVE Published
- 2021-06-21 First Exploit
- 2024-08-05 CVE Updated
- 2024-09-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (7)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/openemr/openemr/pull/2592 | 2022-02-10 |
URL | Date | SRC |
---|