Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r449-xcxv-p6m2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient.

The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient.

EPSS

Процентиль: 44%
0.00217
Низкий

Дефекты

CWE-732

Связанные уязвимости

CVSS3: 8.2
nvd
почти 5 лет назад

The Patient Portal of OpenEMR 5.0.2.1 is affected by a incorrect access control system in portal/patient/_machine_config.php. To exploit the vulnerability, an unauthenticated attacker can register an account, bypassing the permission check of this portal's API. Then, the attacker can then manipulate and read data of every registered patient.

CVSS3: 8.2
fstec
почти 5 лет назад

Уязвимость компонента portal/patient/_machine_config.php программного обеспечения для управления медицинской организацией OpenEMR, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 44%
0.00217
Низкий

Дефекты

CWE-732