CVE-2018-19276
CRITICAL EXPLOITED IN THE WILD NUCLEIOpenMRS Java Deserialization RCE
Title source: metasploitDescription
OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/47792
metasploit
WORKING POC
NORMAL
by Nicolas Serra, mpgn, Shelby Pace · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/openmrs_deserialization.rb
Nuclei Templates (1)
OpenMRS Platform < 2.24.0 - Insecure Object Deserialization
CRITICALVERIFIEDby DhiyaneshDK
Shodan:
html:"OpenMRS"
References (5)
Core 5
Core References
Exploit, Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/151553/OpenMRS-Platform-Insecure-Object-Deserialization.html
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/46327/
Third Party Advisory, VDB Entry x_refsource_misc
http://packetstormsecurity.com/files/155691/OpenMRS-Java-Deserialization-Remote-Code-Execution.html
Third Party Advisory x_refsource_misc
https://know.bishopfox.com/advisories/news/2019/02/openmrs-insecure-object-deserialization
Vendor Advisory x_refsource_confirm
https://talk.openmrs.org/t/critical-security-advisory-cve-2018-19276-2019-02-04/21607
Scores
CVSS v3
9.8
EPSS
0.9333
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2020-10-14
InTheWild.io
2021-10-14
CWE
CWE-502
Status
published
Products (1)
openmrs/openmrs
1.12.0 - 1.12.1
Published
Mar 21, 2019
Tracked Since
Feb 18, 2026