First published: Wed Nov 08 2006(Updated: )
Multiple PHP remote file inclusion vulnerabilities in OpenEMR 2.8.1 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the srcdir parameter to (a) billing_process.php, (b) billing_report.php, (c) billing_report_xml.php, and (d) print_billing_report.php in interface/billing/; (e) login.php; (f) interface/batchcom/batchcom.php; (g) interface/login/login.php; (h) main_info.php and (i) main.php in interface/main/; (j) interface/new/new_patient_save.php; (k) interface/practice/ins_search.php; (l) interface/logout.php; (m) custom_report_range.php, (n) players_report.php, and (o) front_receipts_report.php in interface/reports/; (p) facility_admin.php, (q) usergroup_admin.php, and (r) user_info.php in interface/usergroup/; or (s) custom/import_xml.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <=2.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5795 has a critical severity rating due to its ability to allow remote attackers to execute arbitrary PHP code.
To fix CVE-2006-5795, disable register_globals in your PHP configuration and update OpenEMR to a version later than 2.8.1.
CVE-2006-5795 affects OpenEMR version 2.8.1 and earlier when register_globals is enabled.
Exploitation of CVE-2006-5795 may lead to unauthorized remote code execution and manipulation of the application.
Yes, there are known exploits for CVE-2006-5795 that target the remote file inclusion vulnerability in the specified PHP scripts.