Difference between revisions of "Security Alert Fixes"
From OpenEMR Project Wiki
		Bradymiller (talk | contribs)  | 
				Bradymiller (talk | contribs)   | 
				||
| (60 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
Place to record and track OpenEMR security alerts and their fixes:  | Outdated issues from a long time ago.  | ||
:*Arbitrary Database Creation/Database Enumeration   | |||
:*  | Place to record and track OpenEMR security alerts and their fixes (in chronological order from earlier to later):  | ||
:*  | :*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-db.txt Arbitrary Database Creation/Database Enumeration]'''  | ||
:*  | ::*Fixed in most recent 4.0.0 patch and dev version  | ||
::*  | :*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-lfi.txt Local File Inclusion]  | ||
::*(  | ::*Fixed in most recent 4.0.0 patch and dev version  | ||
:*  | :*[http://packetstormsecurity.org/files/103810 Multiple cross-site scripting]  | ||
::*There are 4 items here:  | |||
::*  | :::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.  | ||
:::*The last 2 items will are fixed in most recent 4.1.1 patch and dev version.  | |||
:*[http://secunia.com/advisories/46560/ sql-injection]  | |||
::*This item is fixed in most recent 4.1.0 patch and dev version.  | |||
:*[http://www.exploit-db.com/exploits/17998 sql-injection]  | |||
::*Fixed in most recent 4.1.0 patch and dev version  | ::*Fixed in most recent 4.1.0 patch and dev version  | ||
:*  | :*[http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/ sql-injection]  | ||
::*Fixed in most recent 4.1.0 patch and dev version  | ::*Fixed in most recent 4.1.0 patch and dev version  | ||
:*  | :*[http://www.htbridge.ch/advisory/HTB23069 Multiple  Local File Inclusion and arbitrary command execution vulnerabilities]  | ||
::*Fixed in most recent 4.1.0 patch and dev version  | ::*Fixed in most recent 4.1.0 patch and dev version  | ||
:*[http://packetstormsecurity.com/files/120274/ZSL-2013-5126.txt arbitrary file upload vulnerability]  | |||
::*Fixed in most recent 4.1.1 patch and dev version  | |||
:*[http://secunia.com/advisories/52145/ Multiple Vulnerabilities]  | |||
::*There are 8 items here:  | |||
:::*The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.  | |||
:::*The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.  | |||
:::*The third item is fixed in most recent 4.1.1 patch and dev version.  | |||
:::*The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.  | |||
:::*The fifth item is fixed in most recent 4.1.1 patch and dev version.  | |||
:::*The sixth item is fixed in most recent 4.1.1 patch and dev version.  | |||
:::*The seventh item is fixed in most recent 4.1.1 patch and dev version.  | |||
:::*The eighth item is fixed in most recent 4.1.1 patch and dev version.  | |||
:*[http://osvdb.org/show/osvdb/90549 XSS Vulnerability]  | |||
::*Fixed in most recent 4.1.1 patch and dev version  | |||
:*[http://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt Multiple Vulnerabilities in OpenEMR]  | |||
::*All the items have been fixed in most recent 4.1.1 patch and dev version.  | |||
:*CVE-2018-10571 - FIXED  | |||
:*CVE-2018-10572 - FIXED  | |||
:*CVE-2018-10573 - FIXED  | |||
<br>  | |||
<br>  | |||
:'''TODO''':  | |||
:*Systematically go through the https://web.nvd.nist.gov/view/vuln/search site to ensure all vulnerabilities have been addressed.  | |||
<br>  | |||
<br>  | |||
[[Category:Security]][[Category:Developer Guide]]  | [[Category:Security]][[Category:Developer Guide]]  | ||
Latest revision as of 01:24, 8 August 2018
Outdated issues from a long time ago.
Place to record and track OpenEMR security alerts and their fixes (in chronological order from earlier to later):
- 
- Fixed in most recent 4.0.0 patch and dev version
 
- Fixed in most recent 4.0.0 patch and dev version
 
- There are 4 items here:
 
- The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
 - The last 2 items will are fixed in most recent 4.1.1 patch and dev version.
 
- This item is fixed in most recent 4.1.0 patch and dev version.
 
- Fixed in most recent 4.1.0 patch and dev version
 
- Fixed in most recent 4.1.0 patch and dev version
 
- Fixed in most recent 4.1.0 patch and dev version
 
- Fixed in most recent 4.1.1 patch and dev version
 
- There are 8 items here:
 
- The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
 - The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
 - The third item is fixed in most recent 4.1.1 patch and dev version.
 - The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
 - The fifth item is fixed in most recent 4.1.1 patch and dev version.
 - The sixth item is fixed in most recent 4.1.1 patch and dev version.
 - The seventh item is fixed in most recent 4.1.1 patch and dev version.
 - The eighth item is fixed in most recent 4.1.1 patch and dev version.
 
- Fixed in most recent 4.1.1 patch and dev version
 
- All the items have been fixed in most recent 4.1.1 patch and dev version.
 
- CVE-2018-10571 - FIXED
 - CVE-2018-10572 - FIXED
 - CVE-2018-10573 - FIXED
 
 
- TODO:
- Systematically go through the https://web.nvd.nist.gov/view/vuln/search site to ensure all vulnerabilities have been addressed.