Difference between revisions of "Security Alert Fixes"

From OpenEMR Project Wiki
Line 8: Line 8:
:*Security exploit: (Multiple cross-site scripting)
:*Security exploit: (Multiple cross-site scripting)
::*http://packetstormsecurity.org/files/103810
::*http://packetstormsecurity.org/files/103810
::*There are 4 items here.
::*There are 4 items here:
:::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The last 2 items will be fixed in next 4.1.1 patch and dev version.
:::*The last 2 items will be fixed in next 4.1.1 patch and dev version.
Line 28: Line 28:
:* Security exploit: (Multiple Vulnerabilities)
:* Security exploit: (Multiple Vulnerabilities)
::*http://secunia.com/advisories/52145/
::*http://secunia.com/advisories/52145/
::*The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
::*There are 7 items here:
::*The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
::*The third item is fixed in most recent 4.1.1 patch and dev version.
:::*The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
::*The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The third item is fixed in most recent 4.1.1 patch and dev version.
::*The fifth item will be fixed in next 4.1.1 patch and dev version.
:::*The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
::*The sixth item will be fixed in next 4.1.1 patch and dev version.
:::*The fifth item will be fixed in next 4.1.1 patch and dev version.
::*The seventh item is fixed in most recent 4.1.1 patch and dev version.
:::*The sixth item will be fixed in next 4.1.1 patch and dev version.
:::*The seventh item is fixed in most recent 4.1.1 patch and dev version.




[[Category:Security]][[Category:Developer Guide]]
[[Category:Security]][[Category:Developer Guide]]

Revision as of 22:40, 19 February 2013

Place to record and track OpenEMR security alerts and their fixes:

  • Fixed in most recent 4.0.0 patch and dev version
  • Fixed in most recent 4.0.0 patch and dev version
  • This link is dead. Bradymiller 20:04, 30 November 2012 (UTC)
  • Security exploit: (Multiple cross-site scripting)
  • The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
  • The last 2 items will be fixed in next 4.1.1 patch and dev version.
  • Security exploit: (sql-injection)
  • Security exploit: (One sql-injection)
  • Security exploit: (One sql-injection)
  • Security exploit: (Multiple Local File Inclusion and arbitrary command execution vulnerabilities)
  • Security exploit: (arbitrary file upload vulnerability)
  • Security exploit: (Multiple Vulnerabilities)
  • The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
  • The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
  • The third item is fixed in most recent 4.1.1 patch and dev version.
  • The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
  • The fifth item will be fixed in next 4.1.1 patch and dev version.
  • The sixth item will be fixed in next 4.1.1 patch and dev version.
  • The seventh item is fixed in most recent 4.1.1 patch and dev version.