Praetorian503 Posted February 21, 2013 Report Posted February 21, 2013 OpenEMR version 4.1.1 suffers from a cross site scripting vulnerability.OpenEMR 4.1.1 (site param) Remote XSS VulnerabilityVendor: OpenEMRProduct web page: http://www.open-emr.orgAffected version: 4.1.1Summary: OpenEMR is a Free and Open Source electronic health records and medicalpractice management application that can run on Windows, Linux, Mac OS X, and manyother platforms.Desc: OpenEMR suffers from a XSS issue due to a failure to properly sanitize user-suppliedinput to the 'site' GET parameter in the central 'globals.php' script which is called byevery script. Attackers can exploit this weakness to execute arbitrary HTML and scriptcode in a user's browser session.Tested on: Microsoft Windows 7 Ultimate SP1 (EN) Apache 2.4.2 (Win32) PHP 5.4.4 MySQL 5.5.25aVulnerability discovered by Gjoko 'LiquidWorm' Krstic @zeroscienceAdvisory ID: ZSL-2013-5129Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2013-5129.phpVendor: http://www.open-emr.org/wiki/index.php/OpenEMR_Patches09.02.2013--http://localhost/openemr/[DIR]/[SCRIPT]?site="><script>alert(1);</script>Source: PacketStorm Quote