Multiple directory traversal vulnerabilities in OpenEMR 4.1.0 allow remote authenticated users to read arbitrary files via a .. (dot dot) in the formname parameter to (1) contrib/acog/print_form.php; or (2) load_form.php, (3) view_form.php, or (4) trend_form.php in interface/patient_file/encounter.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://www.htbridge.ch/advisory/HTB23069 | patch exploit |
http://osvdb.org/78727 | vdb entry |
http://www.securityfocus.com/bid/51788 | vdb entry exploit |
http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html | patch mailing list exploit |
http://secunia.com/advisories/47781 | third party advisory vendor advisory |
http://osvdb.org/78729 | vdb entry |
http://osvdb.org/78728 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/72914 | vdb entry |
http://osvdb.org/78730 | vdb entry |
http://www.open-emr.org/wiki/index.php/OpenEMR_Patches | patch |