NOSH 4a5cfdb allows stored XSS via the create user page. For example, a first name (of a physician, assistant, or billing user) can have a JavaScript payload that is executed upon visiting the /users/2/1 page. This may allow attackers to steal Protected Health Information because the product is for health charting.
References
Link | Resource |
---|---|
https://github.com/shihjay2/docker-nosh | Third Party Advisory |
https://noshemr.wordpress.com | Product Third Party Advisory |
https://github.com/shihjay2/nosh2/issues/202 | Exploit Third Party Advisory |
https://gist.github.com/abbisQQ/e0967d5b8355087c8e224bdd1ace3bf3 | Third Party Advisory |
https://github.com/shihjay2/nosh2/tree/4a5cfdbd73f6a2ab5ee43a33d173c46fe0271533 | Third Party Advisory |
Configurations
Information
Published : 2023-01-29 14:15
Updated : 2023-02-07 09:29
NVD link : CVE-2023-24065
Mitre link : CVE-2023-24065
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
nosh_chartingsystem_project
- nosh_chartingsystem