The Reporting Compatibility Add On before 2.0.4 for OpenMRS, as distributed in OpenMRS Reference Application before 2.6.1, does not authenticate users when deserializing XML input into ReportSchema objects. The result is that remote unauthenticated users are able to execute operating system commands by crafting malicious XML payloads, as demonstrated by a single admin/reports/reportSchemaXml.form request.
References
Link | Resource |
---|---|
https://isears.github.io/jekyll/update/2017/10/21/openmrs-rce.html | Exploit |
https://talk.openmrs.org/t/critical-security-advisory-2017-09-12/13291 | Vendor Advisory |
https://wiki.openmrs.org/display/RES/Release+Notes+2.6.1 | Release Notes Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-23T04:00:00
Updated: 2017-10-23T03:57:01
Reserved: 2017-08-10T00:00:00
Link: CVE-2017-12796
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-10-23T04:29:00.210
Modified: 2017-11-21T16:26:50.230
Link: CVE-2017-12796
JSON object: View
Redhat Information
No data.
CWE