Описание
In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover.
Ссылки
- PatchThird Party Advisory
- ExploitThird Party Advisory
- PatchThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 5.0.0 (включая) до 6.0.0.1 (включая)
cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
EPSS
Процентиль: 20%
0.00065
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-521
Связанные уязвимости
github
больше 3 лет назад
In OpenEMR, versions 5.0.0 to 6.0.0.1 are vulnerable to weak password requirements as it does not enforce a maximum password length limit. If a malicious user is aware of the first 72 characters of the victim user’s password, he can leverage it to an account takeover.
EPSS
Процентиль: 20%
0.00065
Низкий
8.1 High
CVSS3
6.8 Medium
CVSS2
Дефекты
CWE-521