First published: Thu Feb 01 2007(Updated: )
Variable overwrite vulnerability in interface/globals.php in OpenEMR 2.8.2 and earlier allows remote attackers to overwrite arbitrary program variables and conduct other unauthorized activities, such as conduct (a) remote file inclusion attacks via the srcdir parameter in custom/import_xml.php or (b) cross-site scripting (XSS) attacks via the rootdir parameter in interface/login/login_frame.php, via vectors associated with extract operations on the (1) POST and (2) GET superglobal arrays. NOTE: this issue was originally disputed before the extract behavior was identified in post-disclosure analysis. Also, the original report identified "Open Conference Systems," but this was an error.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <=2.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0649 has been classified as a high severity vulnerability due to its potential for variable overwriting and remote file inclusion attacks.
To fix CVE-2007-0649, you should upgrade OpenEMR to a version later than 2.8.2 that contains the necessary security patches.
CVE-2007-0649 affects OpenEMR versions 2.8.2 and earlier.
CVE-2007-0649 allows attackers to perform remote file inclusion attacks, among other unauthorized activities.
Yes, CVE-2007-0649 is considered relatively easy to exploit due to its nature of variable overwriting.