6.5
CVSSv2

CVE-2018-15139

Published: 13/08/2018 Updated: 10/02/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

Unrestricted file upload in interface/super/manage_site_files.php in versions of OpenEMR prior to 5.0.1.4 allows a remote authenticated malicious user to execute arbitrary PHP code by uploading a file with a PHP extension via the images upload form and accessing it in the images directory.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

open-emr openemr

Exploits

OpenEMR version 5013 authenticated remote shell upload exploit ...
OpenEMR version 5013 authenticated remote shell upload exploit that leverages a vulnerability discovered in 2018 ...

Github Repositories

OpenEMR < 5.0.1.4 - (Authenticated) File upload - Remote command execution

OpenEMR CVE-2018-15139 exploit OpenEMR &lt; 5014 - (Authenticated) File upload - Remote command execution Exploit for CVE-2018-15139 Usage $ ruby exploitrb -h OpenEMR &lt; 5014 - (Authenticated) File upload - Remote command execution Source: githubcom/sec-it/exploit-CVE-2019-14530 Usage: exploitrb exploit &lt;url&gt; &lt;filename&