Difference between revisions of "Security Alert Fixes"

From OpenEMR Project Wiki
 
(24 intermediate revisions by the same user not shown)
Line 1: Line 1:
Place to record and track OpenEMR security alerts and their fixes:
Outdated issues from a long time ago.
 
Place to record and track OpenEMR security alerts and their fixes (in chronological order from earlier to later):
:*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-db.txt Arbitrary Database Creation/Database Enumeration]'''
:*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-db.txt Arbitrary Database Creation/Database Enumeration]'''
::*Fixed in most recent 4.0.0 patch and dev version
::*Fixed in most recent 4.0.0 patch and dev version
:*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-lfi.txt Local File Inclusion]
:*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-lfi.txt Local File Inclusion]
::*Fixed in most recent 4.0.0 patch and dev version
::*Fixed in most recent 4.0.0 patch and dev version
:*[http://packetstorm.unixteacher.org/1104-exploits/OpenEMR4.0.0-xss.txt Reflected Cross-site Scripting]
:*[http://packetstormsecurity.org/files/103810 Multiple cross-site scripting]
::*This link is dead. [[User:Bradymiller|Bradymiller]] 20:04, 30 November 2012 (UTC)
::*There are 4 items here:
:*Security exploit: (Multiple cross-site scripting)
::*http://packetstormsecurity.org/files/103810
::*There are 4 items here.
:::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The last 2 items will be fixed in next 4.1.1 patch and dev version.
:::*The last 2 items will are fixed in most recent 4.1.1 patch and dev version.
::*Still unable to confirm, but first two calendar items still likely exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:*[http://secunia.com/advisories/46560/ sql-injection]
:*Security exploit: (Multiple sql-injection)
::*This item is fixed in most recent 4.1.0 patch and dev version.
::*http://secunia.com/advisories/46560/
:*[http://www.exploit-db.com/exploits/17998 sql-injection]
::*There are three items here. The third item has been fixed, however, unsure of the first two.
::*The second item has been fixed and committed to the dev branch and is in the most recent 4.1.1 patch.
::*The first item likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:*Security exploit: (One sql-injection)
::*http://www.exploit-db.com/exploits/17998
::*Fixed in most recent 4.1.0 patch and dev version
::*Fixed in most recent 4.1.0 patch and dev version
:*Security exploit: (One sql-injection)
:*[http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/ sql-injection]
::*http://www.mavitunasecurity.com/sql-injection-vulnerability-in-openemr/
::*Fixed in most recent 4.1.0 patch and dev version
::*Fixed in most recent 4.1.0 patch and dev version
:*Security exploit: (Multiple  Local File Inclusion and arbitrary command execution vulnerabilities)
:*[http://www.htbridge.ch/advisory/HTB23069 Multiple  Local File Inclusion and arbitrary command execution vulnerabilities]
::*http://www.htbridge.ch/advisory/HTB23069
::*Fixed in most recent 4.1.0 patch and dev version
::*Fixed in most recent 4.1.0 patch and dev version
:*Security exploit: (arbitrary file upload vulnerability)
:*[http://packetstormsecurity.com/files/120274/ZSL-2013-5126.txt arbitrary file upload vulnerability]
::*http://packetstormsecurity.com/files/120274/ZSL-2013-5126.txt
::*Fixed in most recent 4.1.1 patch and dev version
:*[http://secunia.com/advisories/52145/ Multiple Vulnerabilities]
::*There are 8 items here:
:::*The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
:::*The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The third item is fixed in most recent 4.1.1 patch and dev version.
:::*The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:::*The fifth item is fixed in most recent 4.1.1 patch and dev version.
:::*The sixth item is fixed in most recent 4.1.1 patch and dev version.
:::*The seventh item is fixed in most recent 4.1.1 patch and dev version.
:::*The eighth item is fixed in most recent 4.1.1 patch and dev version.
:*[http://osvdb.org/show/osvdb/90549 XSS Vulnerability]
::*Fixed in most recent 4.1.1 patch and dev version
::*Fixed in most recent 4.1.1 patch and dev version
:* Security exploit: (Multiple Vulnerabilities)
:*[http://www.trustwave.com/spiderlabs/advisories/TWSL2013-018.txt Multiple Vulnerabilities in OpenEMR]
::*http://secunia.com/advisories/52145/
::*All the items have been fixed in most recent 4.1.1 patch and dev version.
::*The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
:*CVE-2018-10571 - FIXED
::*The second item still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
:*CVE-2018-10572 - FIXED
::*The third item is fixed in most recent 4.1.1 patch and dev version.
:*CVE-2018-10573 - FIXED
::*The fourth item still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
<br>
::*The fifth item will be fixed in next 4.1.1 patch and dev version.
<br>
::*The sixth item will be fixed in next 4.1.1 patch and dev version.
:'''TODO''':
::*The seventh item is fixed in most recent 4.1.1 patch and dev version.
:*Systematically go through the https://web.nvd.nist.gov/view/vuln/search site to ensure all vulnerabilities have been addressed.
 
<br>
 
<br>
[[Category:Security]][[Category:Developer Guide]]
[[Category:Security]][[Category:Developer Guide]]

Latest revision as of 01:24, 8 August 2018

Outdated issues from a long time ago.

Place to record and track OpenEMR security alerts and their fixes (in chronological order from earlier to later):

  • Fixed in most recent 4.0.0 patch and dev version
  • Fixed in most recent 4.0.0 patch and dev version
  • There are 4 items here:
  • The first two items likely still exist. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
  • The last 2 items will are fixed in most recent 4.1.1 patch and dev version.
  • This item is fixed in most recent 4.1.0 patch and dev version.
  • Fixed in most recent 4.1.0 patch and dev version
  • Fixed in most recent 4.1.0 patch and dev version
  • Fixed in most recent 4.1.0 patch and dev version
  • Fixed in most recent 4.1.1 patch and dev version
  • There are 8 items here:
  • The first item is same as the arbitrary file upload vulnerability item reported above and has been fixed in most recent 4.1.1 patch and dev version.
  • The second item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
  • The third item is fixed in most recent 4.1.1 patch and dev version.
  • The fourth item likely still exists. A user needs to be authenticated(logged in) into OpenEMR to be able to do this; note a codebase refactoring is currently underway to fix these types of vulnerabilities.
  • The fifth item is fixed in most recent 4.1.1 patch and dev version.
  • The sixth item is fixed in most recent 4.1.1 patch and dev version.
  • The seventh item is fixed in most recent 4.1.1 patch and dev version.
  • The eighth item is fixed in most recent 4.1.1 patch and dev version.
  • Fixed in most recent 4.1.1 patch and dev version
  • All the items have been fixed in most recent 4.1.1 patch and dev version.
  • CVE-2018-10571 - FIXED
  • CVE-2018-10572 - FIXED
  • CVE-2018-10573 - FIXED



TODO: