Difference between revisions of "Security Alert Fixes"
From OpenEMR Project Wiki
Bradymiller (talk | contribs) |
Bradymiller (talk | contribs) |
||
Line 8: | Line 8: | ||
:*Security exploit: (Multiple cross-site scripting) | :*Security exploit: (Multiple cross-site scripting) | ||
::*http://packetstormsecurity.org/files/103810 | ::*http://packetstormsecurity.org/files/103810 | ||
::*'''There are 4 items here. The last two are in messages.php which now uses the new security model, so should be fixed. The first two use calendar/index.php which I do not think has been addressed. Note, however, that the provided POC links do not reproduce the vulnerability (meaning I can't reproduce the vulnerabilities) | ::*'''There are 4 items here. The last two are in messages.php which now uses the new security model, so should be fixed. The first two use calendar/index.php which I do not think has been addressed. Note, however, that the provided POC links do not reproduce the vulnerability (meaning I can't reproduce the vulnerabilities).''' [[User:Bradymiller|Bradymiller]] 20:08, 30 November 2012 (UTC) | ||
::*'''Still unable to confirm, but guessing the first two calendar items still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. [[User:Bradymiller|Bradymiller]] 09:05, 1 December 2012 (UTC) | |||
:*Security exploit: (Multiple sql-injection) | :*Security exploit: (Multiple sql-injection) | ||
::*http://secunia.com/advisories/46560/ | ::*http://secunia.com/advisories/46560/ | ||
::*'''There are three items here. The third item has been fixed, however, unsure of the first two. Will look into.''' [[User:Bradymiller|Bradymiller]] 20:12, 30 November 2012 (UTC) | ::*'''There are three items here. The third item has been fixed, however, unsure of the first two. Will look into.''' [[User:Bradymiller|Bradymiller]] 20:12, 30 November 2012 (UTC) | ||
::*'''Guessing the first items still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. [[User:Bradymiller|Bradymiller]] 09:05, 1 December 2012 (UTC) | |||
:*Security exploit: (One sql-injection) | :*Security exploit: (One sql-injection) | ||
::*http://www.exploit-db.com/exploits/17998 | ::*http://www.exploit-db.com/exploits/17998 |
Revision as of 09:05, 1 December 2012
Place to record and track OpenEMR security alerts and their fixes:
-
- Fixed in most recent 4.0.0 patch and dev version
- Fixed in most recent 4.0.0 patch and dev version
- This link is dead. Bradymiller 20:04, 30 November 2012 (UTC)
- Security exploit: (Multiple cross-site scripting)
- http://packetstormsecurity.org/files/103810
- There are 4 items here. The last two are in messages.php which now uses the new security model, so should be fixed. The first two use calendar/index.php which I do not think has been addressed. Note, however, that the provided POC links do not reproduce the vulnerability (meaning I can't reproduce the vulnerabilities). Bradymiller 20:08, 30 November 2012 (UTC)
- Still unable to confirm, but guessing the first two calendar items still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. Bradymiller 09:05, 1 December 2012 (UTC)
- Security exploit: (Multiple sql-injection)
- http://secunia.com/advisories/46560/
- There are three items here. The third item has been fixed, however, unsure of the first two. Will look into. Bradymiller 20:12, 30 November 2012 (UTC)
- Guessing the first items still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. Bradymiller 09:05, 1 December 2012 (UTC)
- Security exploit: (One sql-injection)
- http://www.exploit-db.com/exploits/17998
- Fixed in most recent 4.1.0 patch and dev version
- Security exploit: (One sql-injection)
- http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/
- Fixed in most recent 4.1.0 patch and dev version
- Security exploit: (Multiple Local File Inclusion and arbitrary command execution vulnerabilities)
- http://www.htbridge.ch/advisory/HTB23069
- Fixed in most recent 4.1.0 patch and dev version