Description
interface/fax/fax_dispatch.php in OpenEMR 4.1.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the file parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/36651
References (7)
Core 7
Core References
Exploit x_refsource_misc
https://www.htbridge.ch/advisory/HTB23069
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/78731
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/51788
Patch, Vendor Advisory mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-02/0004.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/47781
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72915
Patch x_refsource_confirm
http://www.open-emr.org/wiki/index.php/OpenEMR_Patches
Scores
EPSS
0.0496
EPSS Percentile
89.7%
Details
CWE
CWE-20
Status
published
Products (1)
openemr/openemr
4.1.0
Published
Feb 07, 2012
Tracked Since
Feb 18, 2026