First published: Fri May 13 2022(Updated: )
OpenClinica is an open source software for Electronic Data Capture (EDC) and Clinical Data Management (CDM). OpenClinica prior to version 3.16 is vulnerable to path traversal in multiple endpoints, leading to arbitrary file read/write, and potential remote code execution. There are no known workarounds. This issue has been patched and users are recommended to upgrade.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
OpenClinica | <3.13.1 | |
OpenClinica | >=3.15<3.16.2 | |
OpenClinica | =3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24830 has a medium severity rating due to its potential for arbitrary file read/write and remote code execution.
To fix CVE-2022-24830, upgrade OpenClinica to version 3.16 or later.
CVE-2022-24830 affects OpenClinica versions prior to 3.16, including versions 3.13.1 and 3.14.
Yes, CVE-2022-24830 can potentially lead to remote code execution due to path traversal vulnerabilities.
CVE-2022-24830 is a path traversal vulnerability affecting multiple endpoints in OpenClinica.