Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Directory Traversal in OpenMRS Startup Filter
Vulnerability Description
OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementations should update to the latest patch version of OpenMRS Core for the minor version they use. These are: 2.1.5, 2.2.1, 2.3.5, 2.4.5 and 2.5.3. As a general rule, this vulnerability is already mitigated by Tomcat's URL normalization in Tomcat 7.0.28+. Users on older versions of Tomcat should consider upgrading their Tomcat instance as well as their OpenMRS instance.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
OpenMRS 路径遍历漏洞
Vulnerability Description
Openmrs OpenMRS是美国OpenMRS(Openmrs)公司的一套开源的电子病历系统。 OpenMRS 存在路径遍历漏洞,该漏洞源于在满足 `/images` 和 `/initfilter/scripts` 的 GET 请求时未能清理请求而导致任意文件泄露。 这可以允许攻击者访问运行 OpenMRS 的系统上的任何文件,该文件可由运行 OpenMRS 的用户 id 访问。
CVSS Information
N/A
Vulnerability Type
N/A