Armis Logo< Back

CVE-2023-22972:

Reflected Cross-site scripting (XSS) vulnerability in OpenEMR's eye_mag module allows authenticated users to inject malicious scripts.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

5.4Medium
  • Published Date:Feb 22, 2023
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Threat Predictions

  • EPSS Score:0.3
  • EPSS Percentile:55%

Exploitability

  • Score:2.3
  • Attack Vector:NETWORK
  • Attack Complexity:LOW
  • Privileges Required:LOW
  • User Interaction:REQUIRED
  • Scope:CHANGED

Impact

  • Score:2.7
  • Confidentiality Impact:LOW
  • Integrity Impact:LOW
  • Availability Impact:NONE

Description Preview

Reflected Cross-site scripting (XSS) vulnerability in OpenEMR's eye_mag module allows authenticated users to inject malicious scripts.

Overview

This vulnerability (CVE-2023-22972) affects the eye_mag module in OpenEMR, an open-source electronic health record and medical practice management solution. The vulnerability is classified as CWE-79 (Cross-site Scripting), which occurs when the application does not properly validate or encode user-controlled input before returning it to the user's browser. In this specific case, the eye_mag_functions.php file fails to sanitize the REQUEST_URI parameter, allowing attackers to inject malicious JavaScript code. Since this is a reflected XSS vulnerability, the attack typically requires the victim to click on a specially crafted link or visit a malicious page that sends them to the vulnerable OpenEMR page with the payload in the URL.

Remediation

  • To address this vulnerability, administrators should:
  • 1. Update OpenEMR to version 7.0.0 or later, which contains the security patch for this issue.
  • 2. If immediate updating is not possible, consider implementing web application firewall rules to filter potentially malicious requests containing script tags or other suspicious content in the REQUEST_URI parameter.
  • 3. Ensure proper input validation and output encoding practices are followed throughout the application.
  • 4. Consider implementing Content Security Policy (CSP) headers to provide an additional layer of protection against XSS attacks.
  • 5. Regularly monitor security advisories and apply patches promptly to maintain system security.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!