Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/ | third party advisory exploit |
https://github.com/openemr/openemr/pull/1757/commits/c2808a0493243f618bbbb3459af23c7da3dc5485 | third party advisory patch |
http://packetstormsecurity.com/files/163110/OpenEMR-5.0.1.3-Shell-Upload.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/163482/OpenEMR-5.0.1.3-Shell-Upload.html | exploit vdb entry third party advisory |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15139-Exploit | third party advisory exploit |