SB2019052308 - Multiple vulnerabilities in OpenEMR
Published: May 23, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2018-17181)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data in SaveAudit function in /portal/lib/paylib.php and portalAudit function in /portal/lib/appsql.class.php. A remote authenticated attacker can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
2) Path traversal (CVE-ID: CVE-2018-17180)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences passed via "docid" HTTP GEt parameter to "/portal/lib/download_template.php" URL. A remote authenticated attacker can send a specially crafted HTTP request and read arbitrary files on the system.
3) SQL injection (CVE-ID: CVE-2018-17179)
The vulnerability allows a remote attacker to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data within the make_task() function in "/interface/forms/eye_mag/php/taskman_functions.php" script. A remote authenticated attacker can send a specially crafted request to the "/interface/forms/eye_mag/taskman.php" URL and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
Remediation
Install update from vendor's website.