CVE-2023-22972:
Reflected Cross-site scripting (XSS) vulnerability in OpenEMR's eye_mag module allows authenticated users to inject malicious scripts.
Score
A numerical rating that indicates how dangerous this vulnerability is.
5.4Medium- Published Date:Feb 22, 2023
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.3
- EPSS Percentile:55%
Exploitability
- Score:2.3
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:LOW
- User Interaction:REQUIRED
- Scope:CHANGED
Impact
- Score:2.7
- Confidentiality Impact:LOW
- Integrity Impact:LOW
- Availability Impact:NONE
Description Preview
Reflected Cross-site scripting (XSS) vulnerability in OpenEMR's eye_mag module allows authenticated users to inject malicious scripts.
Overview
This vulnerability (CVE-2023-22972) affects the eye_mag module in OpenEMR, an open-source electronic health record and medical practice management solution. The vulnerability is classified as CWE-79 (Cross-site Scripting), which occurs when the application does not properly validate or encode user-controlled input before returning it to the user's browser. In this specific case, the eye_mag_functions.php file fails to sanitize the REQUEST_URI parameter, allowing attackers to inject malicious JavaScript code. Since this is a reflected XSS vulnerability, the attack typically requires the victim to click on a specially crafted link or visit a malicious page that sends them to the vulnerable OpenEMR page with the payload in the URL.
Remediation
- To address this vulnerability, administrators should:
- 1. Update OpenEMR to version 7.0.0 or later, which contains the security patch for this issue.
- 2. If immediate updating is not possible, consider implementing web application firewall rules to filter potentially malicious requests containing script tags or other suspicious content in the REQUEST_URI parameter.
- 3. Ensure proper input validation and output encoding practices are followed throughout the application.
- 4. Consider implementing Content Security Policy (CSP) headers to provide an additional layer of protection against XSS attacks.
- 5. Regularly monitor security advisories and apply patches promptly to maintain system security.
References
- 1. OpenEMR Patches documentation: https://www.open-emr.org/wiki/index.php/OpenEMR_Patches#7.0.0_Patch_.2811.2F30.2F22.29
- 2. MITRE CWE-79: https://cwe.mitre.org/data/definitions/79.html
- 3. OWASP XSS Prevention Cheat Sheet: https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
- 4. OpenEMR Security Documentation: https://www.open-emr.org/wiki/index.php/OpenEMR_Security
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.