CVE-2019-14530
Severity CVSS v4.0:
Pending analysis
Type:
CWE-22
Path Traversal
Publication date:
13/08/2019
Last modified:
10/02/2022
Description
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* | 5.0.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/163215/OpenEMR-5.0.1.7-Path-Traversal.html
- http://packetstormsecurity.com/files/163375/OpenEMR-5.0.1.7-Path-Traversal.html
- https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-14530-Exploit
- https://github.com/Wezery/CVE-2019-14530
- https://github.com/openemr/openemr/pull/2592



