We found results for “”
CVE-2021-25920
Date: March 22, 2021
Overview
In OpenEMR, versions 2.7.2-rc1 to 6.0.0 are vulnerable to Improper Access Control when creating a new user, which leads to a malicious user able to read and send sensitive messages on behalf of the victim user.Details
The “OpenEMR” application does not enforce adequate checks while creating users. Provided two users are named, one with uppercase and one with lowercase, it is possible for a malicious user to read and send sensitive messages on behalf of the victim user, while totally unknown to the victim user.Affected Environments
v2.7.2-rc1-6.0.0Prevention
Upgrade to version 6.0.0.1Language: PHP
Good to know:
Base Score: |
|
---|---|
Attack Vector (AV): | Network |
Attack Complexity (AC): | Low |
Privileges Required (PR): | High |
User Interaction (UI): | None |
Scope (S): | Unchanged |
Confidentiality (C): | High |
Integrity (I): | High |
Availability (A): | None |
Base Score: |
|
---|---|
Access Vector (AV): | Network |
Access Complexity (AC): | Low |
Authentication (AU): | Single |
Confidentiality (C): | Partial |
Integrity (I): | Partial |
Availability (A): | None |
Additional information: |