OpenMRS Appointment Scheduling Module 直到1.16.x Notes AppointmentRequest.java getNotes notes 跨网站脚本

分类为棘手的漏洞曾在OpenMRS Appointment Scheduling Module 直到1.16.x中发现。 此漏洞会影响功能 getNotes文件 api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java的组件Notes Handler。 手动调试的软件参数:notes不合法输入可导致 跨网站脚本。 漏洞的CWE定义是 CWE-79。 此漏洞的脆弱性 2022-12-24公示人身份39、所发布。 分享公告的网址是github.com。 该漏洞唯一标识为CVE-2022-4727, 攻击可以远程发起, 有技术细节可用。 没有可利用漏洞。 当前漏洞利用价值为美元大约是 $0-$5k。 MITRE ATT&CK项目使用攻击技术T1059.007来解决该问题。 它被宣布为未定义。 我们估计的零日攻击价值约为$0-$5k。 升级到版本1.17.0能够解决此问题。 更新版本下载地址为 github.com。 补丁名称为2ccbe39c020809765de41eeb8ee4c70b5ec49cc8。 错误修复程序下载地址为github.com, 建议对受到影响的组件升级。 该漏洞被披露后,远在此前发表过可能的缓解措施。

字段2022-12-24 08時51分2023-01-24 08時06分2023-01-24 08時09分
vendorOpenMRSOpenMRSOpenMRS
nameAppointment Scheduling ModuleAppointment Scheduling ModuleAppointment Scheduling Module
version<=1.16.x<=1.16.x<=1.16.x
componentNotes HandlerNotes HandlerNotes Handler
fileapi/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.javaapi/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.javaapi/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java
functiongetNotesgetNotesgetNotes
argumentnotesnotesnotes
cwe79 (跨网站脚本)79 (跨网站脚本)79 (跨网站脚本)
risk111
cvss3_vuldb_avNNN
cvss3_vuldb_acLLL
cvss3_vuldb_uiRRR
cvss3_vuldb_sUUU
cvss3_vuldb_cNNN
cvss3_vuldb_iLLL
cvss3_vuldb_aNNN
cvss3_vuldb_rlOOO
cvss3_vuldb_rcCCC
identifier393939
urlhttps://github.com/openmrs/openmrs-module-appointmentscheduling/pull/39https://github.com/openmrs/openmrs-module-appointmentscheduling/pull/39https://github.com/openmrs/openmrs-module-appointmentscheduling/pull/39
name升级升级升级
upgrade_version1.17.01.17.01.17.0
upgrade_urlhttps://github.com/openmrs/openmrs-module-appointmentscheduling/releases/tag/1.17.0https://github.com/openmrs/openmrs-module-appointmentscheduling/releases/tag/1.17.0https://github.com/openmrs/openmrs-module-appointmentscheduling/releases/tag/1.17.0
patch_name2ccbe39c020809765de41eeb8ee4c70b5ec49cc82ccbe39c020809765de41eeb8ee4c70b5ec49cc82ccbe39c020809765de41eeb8ee4c70b5ec49cc8
patch_urlhttps://github.com/openmrs/openmrs-module-appointmentscheduling/commit/2ccbe39c020809765de41eeb8ee4c70b5ec49cc8https://github.com/openmrs/openmrs-module-appointmentscheduling/commit/2ccbe39c020809765de41eeb8ee4c70b5ec49cc8https://github.com/openmrs/openmrs-module-appointmentscheduling/commit/2ccbe39c020809765de41eeb8ee4c70b5ec49cc8
cveCVE-2022-4727CVE-2022-4727CVE-2022-4727
responsibleVulDBVulDBVulDB
date1671836400 (2022-12-24)1671836400 (2022-12-24)1671836400 (2022-12-24)
typeAppointment SoftwareAppointment SoftwareAppointment Software
cvss2_vuldb_avNNN
cvss2_vuldb_acLLL
cvss2_vuldb_ciNNN
cvss2_vuldb_iiPPP
cvss2_vuldb_aiNNN
cvss2_vuldb_rcCCC
cvss2_vuldb_rlOFOFOF
cvss2_vuldb_auSSS
cvss2_vuldb_eNDNDND
cvss3_vuldb_prLLL
cvss3_vuldb_eXXX
cvss2_vuldb_basescore4.04.04.0
cvss2_vuldb_tempscore3.53.53.5
cvss3_vuldb_basescore3.53.53.5
cvss3_vuldb_tempscore3.43.43.4
cvss3_meta_basescore3.53.54.4
cvss3_meta_tempscore3.43.44.3
price_0day$0-$5k$0-$5k$0-$5k
cve_assigned1671836400 (2022-12-24)1671836400 (2022-12-24)
cve_nvd_summaryA vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability.A vulnerability, which was classified as problematic, was found in OpenMRS Appointment Scheduling Module up to 1.16.x. This affects the function getNotes of the file api/src/main/java/org/openmrs/module/appointmentscheduling/AppointmentRequest.java of the component Notes Handler. The manipulation of the argument notes leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 1.17.0 is able to address this issue. The name of the patch is 2ccbe39c020809765de41eeb8ee4c70b5ec49cc8. It is recommended to upgrade the affected component. The identifier VDB-216741 was assigned to this vulnerability.
cvss3_nvd_avN
cvss3_nvd_acL
cvss3_nvd_prN
cvss3_nvd_uiR
cvss3_nvd_sC
cvss3_nvd_cL
cvss3_nvd_iL
cvss3_nvd_aN
cvss3_cna_avN
cvss3_cna_acL
cvss3_cna_prL
cvss3_cna_uiR
cvss3_cna_sU
cvss3_cna_cN
cvss3_cna_iL
cvss3_cna_aN
cve_cnaVulDB
cvss3_nvd_basescore6.1
cvss3_cna_basescore3.5

Interested in the pricing of exploits?

See the underground prices here!