CVE-2007-0649
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
01/02/2007
Last modified:
09/04/2025
Description
Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified "Open Conference Systems," but this was an error.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:openemr:openemr:*:*:*:*:*:*:*:* | 2.8.2 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://attrition.org/pipermail/vim/2007-January/001254.html
- http://attrition.org/pipermail/vim/2007-January/001258.html
- http://osvdb.org/33603
- http://osvdb.org/33609
- http://securityreason.com/securityalert/2202
- http://www.securityfocus.com/archive/1/458306/100/0/threaded
- http://www.securityfocus.com/archive/1/458426/100/0/threaded
- http://www.securityfocus.com/archive/1/458456/100/0/threaded
- http://www.securityfocus.com/archive/1/458476/100/0/threaded
- http://www.securityfocus.com/archive/1/458486/100/0/threaded
- http://www.securityfocus.com/archive/1/458565/100/0/threaded
- http://www.securityfocus.com/bid/22346
- http://www.securityfocus.com/bid/22348
- http://attrition.org/pipermail/vim/2007-January/001254.html
- http://attrition.org/pipermail/vim/2007-January/001258.html
- http://osvdb.org/33603
- http://osvdb.org/33609
- http://securityreason.com/securityalert/2202
- http://www.securityfocus.com/archive/1/458306/100/0/threaded
- http://www.securityfocus.com/archive/1/458426/100/0/threaded
- http://www.securityfocus.com/archive/1/458456/100/0/threaded
- http://www.securityfocus.com/archive/1/458476/100/0/threaded
- http://www.securityfocus.com/archive/1/458486/100/0/threaded
- http://www.securityfocus.com/archive/1/458565/100/0/threaded
- http://www.securityfocus.com/bid/22346
- http://www.securityfocus.com/bid/22348



