{ "id": "CVE-2015-4453", "sourceIdentifier": "cve@mitre.org", "published": "2015-07-05T01:59:00.973", "lastModified": "2024-11-21T02:31:05.953", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "interface/globals.php in OpenEMR 2.x, 3.x, and 4.x before 4.2.0 patch 2 allows remote attackers to bypass authentication and obtain sensitive information via an ignoreAuth=1 value to certain scripts, as demonstrated by (1) interface/fax/fax_dispatch_newpid.php and (2) interface/billing/sl_eob_search.php." }, { "lang": "es", "value": "interface/globals.php en OpenEMR 2.x, 3.x y 4.x en versiones anteriores a 4.2.0 patch 2 permite a atacantes remotos eludir la autenticaci\u00f3n y obtener informaci\u00f3n sensible a trav\u00e9s de un valor ignoreAuth=1 a ciertas secuencias, como se demuestra por (1) interface/fax/fax_dispatch_newpid.php y (2) interface/billing/sl_eob_search.php." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-287" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "962B5289-D5B4-4CD2-AF8B-7E2AF03033F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3EF22D3E-E042-4C36-9A4E-A612DB7FCC7F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D74DDE66-B63E-4390-92CF-E88597E23BCC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "32DD9A39-06AF-49E2-B880-B45527CBAFD5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "ECC05E15-4384-4DA7-BC68-3D870579BFDD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8104CC4-8B78-46B0-9F0B-7A2A65347568" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BE6EB1F8-DD02-4FCA-944B-8BC457EB6D07" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "5F232D5D-0E12-4382-9E50-7A956A05D5A3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:4.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9A974E6D-2FEB-4198-8307-215A9B3BF63B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:open-emr:openemr:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C119467D-0491-487A-8A57-18903E6A0E6A" } ] } ] } ], "references": [ { "url": "http://jvn.jp/en/jp/JVN22677713/index.html", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000092", "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html", "source": "cve@mitre.org" }, { "url": "http://seclists.org/fulldisclosure/2015/Jun/48", "source": "cve@mitre.org" }, { "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/75299", "source": "cve@mitre.org" }, { "url": "http://jvn.jp/en/jp/JVN22677713/index.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2015-000092", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://packetstormsecurity.com/files/132368/OpenEMR-4.2.0-Authentication-Bypass.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://seclists.org/fulldisclosure/2015/Jun/48", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.open-emr.org/wiki/index.php/OpenEMR_Patches", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/75299", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }