Vulnerability Details : CVE-2018-10572
interface/patient_file/letter.php in OpenEMR before 5.0.1 allows remote authenticated users to bypass intended access restrictions via the newtemplatename and form_body parameters.
Products affected by CVE-2018-10572
- cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-10572
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 55 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-10572
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:P |
8.0
|
4.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
References for CVE-2018-10572
-
https://github.com/openemr/openemr/pull/1519
security fixes by bradymiller · Pull Request #1519 · openemr/openemr · GitHubIssue Tracking;Third Party Advisory
-
https://csticsfrontline.wordpress.com/2018/05/24/openemr-%E5%BC%B1%E9%BB%9E%E5%88%86%E6%9E%90/
OpenEMR 弱點分析 – 資安最前線Exploit;Third Party Advisory
-
https://github.com/openemr/openemr/issues/1518
Security issues reported by outside group · Issue #1518 · openemr/openemr · GitHubIssue Tracking;Third Party Advisory
-
https://github.com/openemr/openemr/commit/699e3c2ef68545357cac714505df1419b8bf2051
security fixes (#1519) · openemr/openemr@699e3c2 · GitHubPatch;Third Party Advisory
-
https://www.open-emr.org/wiki/index.php/Release_Features#Version_5.0.1
Release Features - OpenEMR Project WikiVendor Advisory
Jump to