CVE-2018-15152
Authentication bypass vulnerability in portal/account/register.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker to access (1) portal/add_edit_event_user.php, (2) portal/find_appt_popup_user.php, (3) portal/get_allergies.php, (4) portal/get_amendments.php, (5) portal/get_lab_results.php, (6) portal/get_medications.php, (7) portal/get_patient_documents.php, (8) portal/get_problems.php, (9) portal/get_profile.php, (10) portal/portal_payment.php, (11) portal/messaging/messages.php, (12) portal/messaging/secure_chat.php, (13) portal/report/pat_ledger.php, (14) portal/report/portal_custom_report.php, or (15) portal/report/portal_patient_report.php without authenticating as a patient.
Published
2018-08-15T17:29:01.767
Last Modified
2024-11-21T03:50:25.280
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 9.1 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:N
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: NONE
Exploitability Score
10.0
Impact Score
4.9
Weaknesses
Affected Vendors & Products
| Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
| Application |
open-emr
|
openemr
|
< 5.0.1.4 |
Yes
|
References
-
http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15152-Exploit
Exploit, Third Party Advisory
([email protected])
-
https://github.com/openemr/openemr/pull/1758/files
Patch, Third Party Advisory
([email protected])
-
https://insecurity.sh/reports/openemr.pdf
URL Repurposed
([email protected])
-
https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/
Exploit, Third Party Advisory
([email protected])
-
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches
Patch, Release Notes, Vendor Advisory
([email protected])
-
http://packetstormsecurity.com/files/163181/OpenEMR-5.0.1.3-Authentication-Bypass.html
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/Hacker5preme/Exploits/tree/main/CVE-2018-15152-Exploit
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://github.com/openemr/openemr/pull/1758/files
Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://insecurity.sh/reports/openemr.pdf
URL Repurposed
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/
Exploit, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://www.open-emr.org/wiki/index.php/OpenEMR_Patches
Patch, Release Notes, Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)