Vulnerability Description
OpenEMR 7.0.1 contains an authentication brute force vulnerability that allows attackers to bypass rate limiting protections by sending repeated login attempts to the main login endpoint. Attackers can submit POST requests with authUser and clearPass parameters to systematically test username and password combinations without account lockout restrictions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Open-Emr | Openemr | 7.0.1 |
Related Weaknesses (CWE)
References
- https://github.com/openemr/openemr/archive/refs/tags/v7_0_1.tar.gzProduct
- https://www.exploit-db.com/exploits/51413ExploitVDB Entry
- https://www.open-emr.org/Product
- https://www.vulncheck.com/advisories/openemr-authentication-brute-force-mitigatiThird Party Advisory
FAQ
What is CVE-2023-54347?
CVE-2023-54347 is a vulnerability with a CVSS score of 7.5 (HIGH). OpenEMR 7.0.1 contains an authentication brute force vulnerability that allows attackers to bypass rate limiting protections by sending repeated login attempts to the main login endpoint. Attackers ca...
How severe is CVE-2023-54347?
CVE-2023-54347 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-54347?
Check the references section above for vendor advisories and patch information. Affected products include: Open-Emr Openemr.