First published: Mon Aug 13 2018(Updated: )
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open-emr Openemr | <5.0.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.