First published: Mon Aug 13 2018(Updated: )
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to read arbitrary files via the "docid" parameter when the mode is set to get.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OpenEMR | <5.0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15140 is classified as a high severity vulnerability due to its potential for unauthorized file access.
To fix CVE-2018-15140, upgrade OpenEMR to version 5.0.1.4 or later.
Authenticated users in the patient portal of OpenEMR versions before 5.0.1.4 are affected by CVE-2018-15140.
CVE-2018-15140 can be exploited by remote attackers to perform directory traversal and access arbitrary files.
The impact of CVE-2018-15140 includes the potential exposure of sensitive files to unauthorized users.