The Reporting Compatibility Add On before 2.0.4 for OpenMRS, as distributed in OpenMRS Reference Application before 2.6.1, does not authenticate users when deserializing XML input into ReportSchema objects. The result is that remote unauthenticated users are able to execute operating system commands by crafting malicious XML payloads, as demonstrated by a single admin/reports/reportSchemaXml.form request.
References
Link | Resource |
---|---|
https://wiki.openmrs.org/display/RES/Release+Notes+2.6.1 | Release Notes Vendor Advisory |
https://talk.openmrs.org/t/critical-security-advisory-2017-09-12/13291 | Vendor Advisory |
https://isears.github.io/jekyll/update/2017/10/21/openmrs-rce.html | Exploit |
Configurations
Information
Published : 2017-10-22 21:29
Updated : 2017-11-21 08:26
NVD link : CVE-2017-12796
Mitre link : CVE-2017-12796
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
openmrs
- openmrs