CVE-2019-14530

HIGH NUCLEI LAB

OpenEMR <5.0.2 - Info Disclosure

Title source: llm

Description

An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.

Exploits (3)

exploitdb WORKING POC
by Ron Jost · pythonwebappsphp
https://www.exploit-db.com/exploits/50037
nomisec WORKING POC 4 stars
by sec-it · poc
https://github.com/sec-it/exploit-CVE-2019-14530
nomisec WRITEUP
by Wezery · poc
https://github.com/Wezery/CVE-2019-14530

Nuclei Templates (1)

OpenEMR <5.0.2 - Local File Inclusion
HIGHVERIFIEDby TenBird
Shodan: http.html:"openemr" || http.title:"openemr" || http.favicon.hash:1971268439
FOFA: icon_hash=1971268439 || body="openemr" || title="openemr" || app="openemr"

Scores

CVSS v3 8.8
EPSS 0.6023
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull openemr/openemr:5.0.1

Details

CWE
CWE-22
Status published
Products (1)
open-emr/openemr < 5.0.2
Published Aug 13, 2019
Tracked Since Feb 18, 2026