Unrestricted file write vulnerabilities allow attackers to write file such as PHP files, in locations where the web server user has access to write. This may allow an attacker to write files with malicious content and may lead to remote code execution.
An attacker must be authenticated to perform this attack.
Where the Issue Occurred
The following code snippet displays the usage of the fopen function in PHP within the lh-ehr application:
This creates or overwrites a file that the web server user has access to. The following code snippet displays writing user controlled content within the user controlled file:
The Issue
Unrestricted file write vulnerabilities allow attackers to write file such as PHP files, in locations where the web server user has access to write. This may allow an attacker to write files with malicious content and may lead to remote code execution.
An attacker must be authenticated to perform this attack.
Where the Issue Occurred
The following code snippet displays the usage of the
fopenfunction in PHP within the lh-ehr application:lh-ehr/interface/patient_file/letter.php
Line 278 in cacaa71
This creates or overwrites a file that the web server user has access to. The following code snippet displays writing user controlled content within the user controlled file:
lh-ehr/interface/patient_file/letter.php
Line 284 in cacaa71
The text was updated successfully, but these errors were encountered: