漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Directory Traversal in OpenMRS Startup Filter
Vulnerability Description
OpenMRS is a patient-based medical record system focusing on giving providers a free customizable electronic medical record system. Affected versions are subject to arbitrary file exfiltration due to failure to sanitize request when satisfying GET requests for `/images` & `/initfilter/scripts`. This can allow an attacker to access any file on a system running OpenMRS that is accessible to the user id OpenMRS is running under. Affected implementations should update to the latest patch version of OpenMRS Core for the minor version they use. These are: 2.1.5, 2.2.1, 2.3.5, 2.4.5 and 2.5.3. As a general rule, this vulnerability is already mitigated by Tomcat's URL normalization in Tomcat 7.0.28+. Users on older versions of Tomcat should consider upgrading their Tomcat instance as well as their OpenMRS instance.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
OpenMRS 路径遍历漏洞
Vulnerability Description
Openmrs OpenMRS是美国OpenMRS(Openmrs)公司的一套开源的电子病历系统。 OpenMRS 存在路径遍历漏洞,该漏洞源于在满足 `/images` 和 `/initfilter/scripts` 的 GET 请求时未能清理请求而导致任意文件泄露。 这可以允许攻击者访问运行 OpenMRS 的系统上的任何文件,该文件可由运行 OpenMRS 的用户 id 访问。
CVSS Information
N/A
Vulnerability Type
N/A