An Insecure Direct Object Reference (IDOR) vulnerability in OpenEMR 6.0.0 allows any authenticated attacker to access and modify unauthorized areas via a crafted POST request to /modules/zend_modules/public/Installer/register.
The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Link | Tags |
---|---|
https://www.open-emr.org/ | vendor advisory |
https://securityforeveryone.com/blog/inactive-post-test/openemr-0-day-idor-vulnerability | not applicable |
https://github.com/openemr/openemr | third party advisory product |