Summary
Detail | |||
---|---|---|---|
Vendor | Openemr | First view | 2006-06-09 |
Product | Openemr | Last view | 2012-02-07 |
Version | Type | ||
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
CPE Name | Affected CVE |
---|---|
cpe:2.3:a:openemr:openemr:2.8.1:*:*:*:*:*:*:* | 4 |
cpe:2.3:a:openemr:openemr:4.1.0:*:*:*:*:*:*:* | 2 |
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.5 | 2012-02-07 | CVE-2012-0992 | interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter. |
3.5 | 2012-02-07 | CVE-2012-0991 | Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter. |
4.3 | 2007-01-31 | CVE-2007-0649 | Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified "Open Conference Systems," but this was an error. |
6.8 | 2006-11-08 | CVE-2006-5811 | PHP remote file inclusion vulnerability in library/translation.inc.php in OpenEMR 2.8.1, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[srcdir] parameter. |
7.5 | 2006-11-08 | CVE-2006-5795 | Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php. |
6.8 | 2006-06-09 | CVE-2006-2929 | PHP remote file inclusion vulnerability in contrib/forms/evaluation/C_FormEvaluation.class.php in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the GLOBALS[fileroot] parameter. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
33% (1) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
33% (1) | CWE-20 | Improper Input Validation |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
33609 | OpenEMR interface/login/login_frame.php rootdir Parameter XSS |
33603 | OpenEMR import_xml.php srcdir Parameter Remote File Inclusion |
30613 | OpenEMR translation.inc.php GLOBALS[srcdir] Parameter Remote File Inclusion |
30612 | OpenEMR import_xml.php srcdir Parameter Remote File Inclusion |
30611 | OpenEMR facility_admin.php srcdir Parameter Remote File Inclusion |
30610 | OpenEMR user_info.php srcdir Parameter Remote File Inclusion |
30609 | OpenEMR usergroup_admin.php srcdir Parameter Remote File Inclusion |
30608 | OpenEMR facility_admin.php srcdir Parameter Remote File Inclusion |
30607 | OpenEMR front_receipts_report.php srcdir Parameter Remote File Inclusion |
30606 | OpenEMR players_report.php srcdir Parameter Remote File Inclusion |
30605 | OpenEMR custom_report_range.php srcdir Parameter Remote File Inclusion |
30604 | OpenEMR logout.php srcdir Parameter Remote File Inclusion |
30603 | OpenEMR ins_search.php srcdir Parameter Remote File Inclusion |
30602 | OpenEMR new_patient_save.php srcdir Parameter Remote File Inclusion |
30601 | OpenEMR main.php srcdir Parameter Remote File Inclusion |
30600 | OpenEMR main_info.php srcdir Parameter Remote File Inclusion |
30599 | OpenEMR interface/login/login.php srcdir Parameter Remote File Inclusion |
30598 | OpenEMR batchcom.php srcdir Parameter Remote File Inclusion |
30597 | OpenEMR login.php srcdir Parameter Remote File Inclusion |
30596 | OpenEMR print_billing_report.php srcdir Parameter Remote File Inclusion |
30595 | OpenEMR billing_report_xml.php srcdir Parameter Remote File Inclusion |
30594 | OpenEMR billing_report.php srcdir Parameter Remote File Inclusion |
30593 | OpenEMR billing_process.php srcdir Parameter Remote File Inclusion |
26231 | OpenEMR C_FormEvaluation.class.php fileroot Parameter Remote File Inclusion |
OpenVAS Exploits
id | Description |
---|---|
2012-02-02 | Name : OpenEMR Local File Include and Command Injection Vulnerabilities File : nvt/gb_openemr_51788.nasl |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2006-06-09 | Name: The remote web server contains a PHP application that is prone to a remote fi... File: openemr_fileroot_file_include.nasl - Type: ACT_ATTACK |