CVE-2023-22974

A Path Traversal in setup.php in OpenEMR < 7.0.0 allows remote unauthenticated users to read arbitrary files by controlling a connection to an attacker-controlled MySQL server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*

History

03 Mar 2023, 02:54

Type Values Removed Values Added
CWE CWE-552
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - (MISC) https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29 - Patch, Release Notes
References (MISC) https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - (MISC) https://www.sonarsource.com/blog/openemr-remote-code-execution-in-your-healthcare-system/ - Exploit, Third Party Advisory
CPE cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
First Time Open-emr
Open-emr openemr

22 Feb 2023, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-02-22 21:15

Updated : 2023-12-10 14:48


NVD link : CVE-2023-22974

Mitre link : CVE-2023-22974

CVE.ORG link : CVE-2023-22974


JSON object : View

Products Affected

open-emr

  • openemr
CWE
CWE-552

Files or Directories Accessible to External Parties