Vulnerability Description
interface/patient_file/letter.php in OpenEMR before 5.0.1 allows remote authenticated users to bypass intended access restrictions via the newtemplatename and form_body parameters.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | < 5.0.1 |
References
- https://csticsfrontline.wordpress.com/2018/05/24/openemr-%E5%BC%B1%E9%BB%9E%E5%8ExploitThird Party Advisory
- https://github.com/openemr/openemr/commit/699e3c2ef68545357cac714505df1419b8bf20PatchThird Party Advisory
- https://github.com/openemr/openemr/issues/1518Issue TrackingThird Party Advisory
- https://github.com/openemr/openemr/pull/1519Issue TrackingThird Party Advisory
- https://www.open-emr.org/wiki/index.php/Release_Features#Version_5.0.1Vendor Advisory
- https://csticsfrontline.wordpress.com/2018/05/24/openemr-%E5%BC%B1%E9%BB%9E%E5%8ExploitThird Party Advisory
- https://github.com/openemr/openemr/commit/699e3c2ef68545357cac714505df1419b8bf20PatchThird Party Advisory
- https://github.com/openemr/openemr/issues/1518Issue TrackingThird Party Advisory
- https://github.com/openemr/openemr/pull/1519Issue TrackingThird Party Advisory
- https://www.open-emr.org/wiki/index.php/Release_Features#Version_5.0.1Vendor Advisory
FAQ
What is CVE-2018-10572?
CVE-2018-10572 is a vulnerability with a CVSS score of 6.5 (MEDIUM). interface/patient_file/letter.php in OpenEMR before 5.0.1 allows remote authenticated users to bypass intended access restrictions via the newtemplatename and form_body parameters.
How severe is CVE-2018-10572?
CVE-2018-10572 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-10572?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.