OpenEMR 4.1.1 (site param) Remote XSS Vulnerability

Risk: Low
Local: No
Remote: Yes

OpenEMR 4.1.1 (site param) Remote XSS Vulnerability Vendor: OpenEMR Product web page: Affected version: 4.1.1 Summary: OpenEMR is a Free and Open Source electronic health records and medical practice management application that can run on Windows, Linux, Mac OS X, and many other platforms. Desc: OpenEMR suffers from a XSS issue due to a failure to properly sanitize user-supplied input to the 'site' GET parameter in the central 'globals.php' script which is called by every script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session. Tested on: Microsoft Windows 7 Ultimate SP1 (EN) Apache 2.4.2 (Win32) PHP 5.4.4 MySQL 5.5.25a Vulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscience Advisory ID: ZSL-2013-5129 Advisory URL: Vendor: 09.02.2013 -- http://localhost/openemr/[DIR]/[SCRIPT]?site="><script>alert(1);</script>


Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022,


Back to Top