Vulnerability Description
OpenEMR 5.0.1.3 allows Cross-Site Request Forgery (CSRF) via library/ajax and interface/super, as demonstrated by use of interface/super/manage_site_files.php to upload a .php file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | 5.0.1.3 |
Related Weaknesses (CWE)
References
- https://community.open-emr.org/t/openemr-security/10597ExploitVendor Advisory
- https://www.open-emr.org/wiki/images/1/11/Openemr_insecurity.pdfExploitVendor Advisory
- https://community.open-emr.org/t/openemr-security/10597ExploitVendor Advisory
- https://www.open-emr.org/wiki/images/1/11/Openemr_insecurity.pdfExploitVendor Advisory
FAQ
What is CVE-2018-16795?
CVE-2018-16795 is a vulnerability with a CVSS score of 8.8 (HIGH). OpenEMR 5.0.1.3 allows Cross-Site Request Forgery (CSRF) via library/ajax and interface/super, as demonstrated by use of interface/super/manage_site_files.php to upload a .php file.
How severe is CVE-2018-16795?
CVE-2018-16795 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-16795?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.