Description
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
Exploits (3)
Nuclei Templates (1)
OpenEMR <5.0.2 - Local File Inclusion
HIGHVERIFIEDby TenBird
Shodan:
http.html:"openemr" || http.title:"openemr" || http.favicon.hash:1971268439
FOFA:
icon_hash=1971268439 || body="openemr" || title="openemr" || app="openemr"
References (5)
Scores
CVSS v3
8.8
EPSS
0.6023
EPSS Percentile
98.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
Community Lab
Details
CWE
CWE-22
Status
published
Products (1)
open-emr/openemr
< 5.0.2
Published
Aug 13, 2019
Tracked Since
Feb 18, 2026