An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://github.com/openemr/openemr/pull/2592 | third party advisory patch |
https://github.com/Wezery/CVE-2019-14530 | third party advisory exploit |
http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html | exploit vdb entry third party advisory |
http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html | exploit vdb entry third party advisory |
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-14530-Exploit | third party advisory exploit |