Difference between revisions of "Security Alert Fixes"
From OpenEMR Project Wiki
		| Bradymiller (talk | contribs)  (Created page with "Place to record and track OpenEMR security alerts and their fixes: :*Security exploit: http://packetstormsecurity.org/files/103810 (waiting for a developer to fix) :*Security exp...") | Bradymiller (talk | contribs)  | ||
| (70 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
| Place to record and track OpenEMR security alerts and their fixes: | Outdated issues from a long time ago. | ||
| :* | |||
| :* | Place to record and track OpenEMR security alerts and their fixes (in chronological order from earlier to later): | ||
| :*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-db.txt Arbitrary Database Creation/Database Enumeration]''' | |||
| ::*Fixed in most recent 4.0.0 patch and dev version | |||
| :*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-lfi.txt Local File Inclusion] | |||
| ::*Fixed in most recent 4.0.0 patch and dev version | |||
| :*[http://packetstormsecurity.org/files/103810 Multiple cross-site scripting] | |||
| ::*There are 4 items here: | |||
| :::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. | |||
| :::*The last 2 items will are fixed in most recent 4.1.1 patch and dev version. | |||
| :*[http://secunia.com/advisories/46560/ sql-injection] | |||
| ::*This item is fixed in most recent 4.1.0 patch and dev version. | |||
| :*[http://www.exploit-db.com/exploits/17998 sql-injection] | |||
| ::*Fixed in most recent 4.1.0 patch and dev version | |||
| :*[http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/ sql-injection] | |||
| ::*Fixed in most recent 4.1.0 patch and dev version | |||
| :*[http://www.htbridge.ch/advisory/HTB23069 Multiple  Local File Inclusion and arbitrary command execution vulnerabilities] | |||
| ::*Fixed in most recent 4.1.0 patch and dev version | |||
| :*[http://packetstormsecurity.com/files/120274/ZSL-2013-5126.txt arbitrary file upload vulnerability] | |||
| ::*Fixed in most recent 4.1.1 patch and dev version | |||
| :*[http://secunia.com/advisories/52145/ Multiple Vulnerabilities] | |||
| ::*There are 8 items here: | |||
| :::*The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version. | |||
| :::*The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. | |||
| :::*The third item is fixed in most recent 4.1.1 patch and dev version. | |||
| :::*The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities. | |||
| :::*The fifth item is fixed in most recent 4.1.1 patch and dev version. | |||
| :::*The sixth item is fixed in most recent 4.1.1 patch and dev version. | |||
| :::*The seventh item is fixed in most recent 4.1.1 patch and dev version. | |||
| :::*The eighth item is fixed in most recent 4.1.1 patch and dev version. | |||
| :*[http://osvdb.org/show/osvdb/90549 XSS Vulnerability] | |||
| ::*Fixed in most recent 4.1.1 patch and dev version | |||
| :*[http://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt Multiple Vulnerabilities in OpenEMR] | |||
| ::*All the items have been fixed in most recent 4.1.1 patch and dev version. | |||
| :*CVE-2018-10571 - FIXED | |||
| :*CVE-2018-10572 - FIXED | |||
| :*CVE-2018-10573 - FIXED | |||
| <br> | |||
| <br> | |||
| :'''TODO''': | |||
| :*Systematically go through the https://web.nvd.nist.gov/view/vuln/search site to ensure all vulnerabilities have been addressed. | |||
| <br> | |||
| <br> | |||
| [[Category:Security]][[Category:Developer Guide]] | |||
Latest revision as of 01:24, 8 August 2018
Outdated issues from a long time ago.
Place to record and track OpenEMR security alerts and their fixes (in chronological order from earlier to later):
- 
- Fixed in most recent 4.0.0 patch and dev version
 
 - Fixed in most recent 4.0.0 patch and dev version
 
 - There are 4 items here:
 - The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
- The last 2 items will are fixed in most recent 4.1.1 patch and dev version.
 
 
 - This item is fixed in most recent 4.1.0 patch and dev version.
 
 - Fixed in most recent 4.1.0 patch and dev version
 
 - Fixed in most recent 4.1.0 patch and dev version
 
 - Fixed in most recent 4.1.0 patch and dev version
 
 - Fixed in most recent 4.1.1 patch and dev version
 
 - There are 8 items here:
 - The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
- The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
- The third item is fixed in most recent 4.1.1 patch and dev version.
- The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
- The fifth item is fixed in most recent 4.1.1 patch and dev version.
- The sixth item is fixed in most recent 4.1.1 patch and dev version.
- The seventh item is fixed in most recent 4.1.1 patch and dev version.
- The eighth item is fixed in most recent 4.1.1 patch and dev version.
 
 
 - Fixed in most recent 4.1.1 patch and dev version
 
 - All the items have been fixed in most recent 4.1.1 patch and dev version.
 
 - CVE-2018-10571 - FIXED
- CVE-2018-10572 - FIXED
- CVE-2018-10573 - FIXED
 
- TODO:
- Systematically go through the https://web.nvd.nist.gov/view/vuln/search site to ensure all vulnerabilities have been addressed.
 

