Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vqv8-75fg-f6w9

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

EPSS

Процентиль: 99%
0.88534
Высокий

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 8.8
nvd
около 5 лет назад

The Patient Portal of OpenEMR 5.0.2.1 is affected by a Command Injection vulnerability in /interface/main/backup.php. To exploit the vulnerability, an authenticated attacker can send a POST request that executes arbitrary OS commands via shell metacharacters.

EPSS

Процентиль: 99%
0.88534
Высокий

Дефекты

CWE-78