Multiple reflected cross-site scripting (XSS) vulnerabilities in OpenEMR before 5.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) patient parameter to interface/main/finder/finder_navigation.php; (2) key parameter to interface/billing/get_claim_file.php; (3) formid or (4) formseq parameter to interface/orders/types.php; (5) eraname, (6) paydate, (7) post_to_date, (8) deposit_date, (9) debug, or (10) InsId parameter to interface/billing/sl_eob_process.php; (11) form_source, (12) form_paydate, (13) form_deposit_date, (14) form_amount, (15) form_name, (16) form_pid, (17) form_encounter, (18) form_date, or (19) form_to_date parameter to interface/billing/sl_eob_search.php; (20) codetype or (21) search_term parameter to interface/de_identification_forms/find_code_popup.php; (22) search_term parameter to interface/de_identification_forms/find_drug_popup.php; (23) search_term parameter to interface/de_identification_forms/find_immunization_popup.php; (24) id parameter to interface/forms/CAMOS/view.php; (25) id parameter to interface/forms/reviewofs/view.php; or (26) list_id parameter to library/custom_template/personalize.php.
References
Link | Resource |
---|---|
https://www.open-emr.org/wiki/index.php/Release_Features#Version_5.0.1 | Release Notes Third Party Advisory Vendor Advisory |
https://github.com/openemr/openemr/pull/1519 | Patch Third Party Advisory |
https://github.com/openemr/openemr/issues/1518 | Third Party Advisory |
https://github.com/openemr/openemr/commit/699e3c2ef68545357cac714505df1419b8bf2051 | Patch Third Party Advisory |
https://csticsfrontline.wordpress.com/2018/05/24/openemr-%E5%BC%B1%E9%BB%9E%E5%88%86%E6%9E%90/ |
Configurations
Information
Published : 2018-04-30 10:29
Updated : 2018-06-13 18:29
NVD link : CVE-2018-10571
Mitre link : CVE-2018-10571
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
open-emr
- openemr