Difference between revisions of "Security Alert Fixes"

From OpenEMR Project Wiki
Line 13: Line 13:
::*http://secunia.com/advisories/46560/
::*http://secunia.com/advisories/46560/
::*There are three items here. The third item has been fixed, however, unsure of the first two. [[User:Bradymiller|Bradymiller]] 20:12, 30 November 2012 (UTC)
::*There are three items here. The third item has been fixed, however, unsure of the first two. [[User:Bradymiller|Bradymiller]] 20:12, 30 November 2012 (UTC)
::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. [[User:Bradymiller|Bradymiller]] 09:05, 1 December 2012 (UTC)
::*The second item has been fixed and committed to the dev branch (it will go out in the next 4.1.1 patch) [[User:Bradymiller|Bradymiller]] 09:10, 1 December 2012 (UTC)
::*The first item likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. [[User:Bradymiller|Bradymiller]] 09:05, 1 December 2012 (UTC)
:*Security exploit: (One sql-injection)
:*Security exploit: (One sql-injection)
::*http://www.exploit-db.com/exploits/17998
::*http://www.exploit-db.com/exploits/17998

Revision as of 09:10, 1 December 2012

Place to record and track OpenEMR security alerts and their fixes:

  • Fixed in most recent 4.0.0 patch and dev version
  • Fixed in most recent 4.0.0 patch and dev version
  • This link is dead. Bradymiller 20:04, 30 November 2012 (UTC)
  • Security exploit: (Multiple cross-site scripting)
  • http://packetstormsecurity.org/files/103810
  • There are 4 items here. The last two are in messages.php which now uses the new security model, so should be fixed. The first two use calendar/index.php which I do not think has been addressed. Note, however, that the provided POC links do not reproduce the vulnerability (meaning I can't reproduce the vulnerabilities). Bradymiller 20:08, 30 November 2012 (UTC)
  • Still unable to confirm, but first two calendar items still likely exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. Bradymiller 09:05, 1 December 2012 (UTC)
  • Security exploit: (Multiple sql-injection)
  • http://secunia.com/advisories/46560/
  • There are three items here. The third item has been fixed, however, unsure of the first two. Bradymiller 20:12, 30 November 2012 (UTC)
  • The second item has been fixed and committed to the dev branch (it will go out in the next 4.1.1 patch) Bradymiller 09:10, 1 December 2012 (UTC)
  • The first item likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. Bradymiller 09:05, 1 December 2012 (UTC)
  • Security exploit: (One sql-injection)
  • Security exploit: (One sql-injection)
  • Security exploit: (Multiple Local File Inclusion and arbitrary command execution vulnerabilities)