{"id":"CVE-2018-15153","details":"OS command injection occurring in versions of OpenEMR before 5.0.1.4 allows a remote authenticated attacker to execute arbitrary commands by making a crafted request to interface/main/daemon_frame.php after modifying the \"hylafax_server\" global variable in interface/super/edit_globals.php.","modified":"2026-04-11T18:43:49.897515Z","published":"2018-08-15T17:29:01.893Z","references":[{"type":"ADVISORY","url":"https://insecurity.sh/reports/openemr.pdf"},{"type":"ADVISORY","url":"https://www.databreaches.net/openemr-patches-serious-vulnerabilities-uncovered-by-project-insecurity/"},{"type":"REPORT","url":"https://github.com/openemr/openemr/pull/1757"},{"type":"FIX","url":"https://www.open-emr.org/wiki/index.php/OpenEMR_Patches"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/45161/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/openemr/openemr","events":[{"introduced":"0"},{"fixed":"8f6b1724e1a71df6a4c2ba0aeaf900a877b20546"}],"database_specific":{"source":"CPE_FIELD","cpe":"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"fixed":"5.0.1.4"}]}}],"versions":["v2_7_2","v2_7_2-rc1","v2_7_2-rc2","v2_7_3-rc1","v2_8_0","v2_8_1","v2_8_2","v2_8_3","v2_9_0","v3_0_0","v3_0_1","v5_0_1","v5_0_1_1","v5_0_1_2","v5_0_1_3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-15153.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}