You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Unrestricted file write vulnerabilities allow attackers to write file such as PHP files, in locations where the web server user has access to write. This may allow an attacker to write files with malicious content and may lead to remote code execution.
An attacker must be authenticated to perform this attack.
Where the Issue Occurred
The following code snippet displays the usage of the fopen function in PHP within the lh-ehr application:
This creates or overwrites a file that the web server user has access to. The following code snippet displays writing user controlled content within the user controlled file:
--
*MUA N. LAURENT*: Lead Software Engineer
Akivas Inc. <https://akivas.com/>
Akwa, Douala,CM 00237 | 174 Royal Rd, Cape Town, WC 7405, SA
Phone: (237) 670-518-086
realJema
added a commit
to realJema/lh-ehr
that referenced
this issue
Mar 17, 2020
The Issue
Unrestricted file write vulnerabilities allow attackers to write file such as PHP files, in locations where the web server user has access to write. This may allow an attacker to write files with malicious content and may lead to remote code execution.
An attacker must be authenticated to perform this attack.
Where the Issue Occurred
The following code snippet displays the usage of the
fopen
function in PHP within the lh-ehr application:lh-ehr/interface/patient_file/letter.php
Line 254 in cacaa71
This creates or overwrites a file that the web server user has access to. The following code snippet displays writing user controlled content within the user controlled file:
lh-ehr/interface/patient_file/letter.php
Line 260 in cacaa71
The text was updated successfully, but these errors were encountered: